Search result for It security Online Courses & Certifications
Get Course Alerts by Email
Security Operations
by Faye Mitchell , Sandy Taramonli , Christo Panchev- 0.0
2
Examine the role and composition of a security operations centre (SOC) and how it works within an organisation. The role of the security operations centre (SOC)SOC processesSOC staffThe SOC interface with the businessSOC, governance and IT service managementSecurity traps and the dark net...
Free
Beginner's Course in System Security & Digital Forensics..
by Sridhar Iyer- 0.0
3.5 hours on-demand video
Learn how to hack into a system and finally secure it using system security. I am beginning with lab sessions on a fairly new subject "Advanced System Security and Digital Forensics"....
$12.99
Hacking in Practice: Intensive Ethical Hacking MEGA Course
by IT Security Academy- 4.2
21 hours on-demand video
IT Security Academy (ISA) is a company that associates ITsec Professionals. Network and IT security is no joke. We do not recommend using these techniques to infiltrate networks or IT systems without permission and consent. Become CISS – Certified IT Security Specialist by covering the following topics: Beginner to Advanced IT Security IT Security Academy Exam Preparation IT security trends....
$23.99
International Security Management
by Gabriele Jacobs , Dominique Lapprand , Anthony Thompson , Bernat Vivolas Jordà , Lola Valles , Milton Sousa , Fabio Bisogni , Jonathan Saunders , Alice Raven- 4.7
Approx. 9 hours to complete
In this MOOC you will learn about the colorful and diverse international security landscape, and gain insights into challenging topics including Open Source Intelligence, serious organised crime and illicit trade. Key organisations with a security function Environmental security & migration (case study) The international security landscape Managing security What is security management?...
Software Design as an Element of the Software Development Lifecycle
by Albert Glock- 4.6
Approx. 11 hours to complete
Design has a role in the life cycle; it is always there, regardless of the kind of life cycle we’re talking about. How High-Level Design (or Architecture) handles Security Problems How High-Level Design (or Architecture) handles Security Problems...
The Business of Social
by Randy Hlavac- 4.7
Approx. 6 hours to complete
In a 2014 study of CEOs and CMOs, IBM found 63% wanted social strategies which generate business metrics while only 20% of businesses worldwide actually have them. This means strategies which not only grow your company’s social footprint but link to your sales and marketing systems. Additional MOOC 5 faculty include:...
IP Addressing and Subnetting - Hands-on Learning Approach
by TIA Education, Andrew Ramdayal- 0.0
4 hours on-demand video
Learn IP Addressing to ace your A+, Network+, Security+, CCNA, CCNP, CEH, MCSA, MCSE, and any other IT Certifications. This class will not use slides to teach, it is a very interactive class with actual examples and ways to implement them....
$12.99
Related searches
Certified Information Systems Security Professional @2019
by Integrity Training- 4.3
15.5 hours on-demand video
The Certified Information Systems Security Professional course is a preparatory course for the CISSP certification exam provided by (ISC)2, the world’s leading cybersecurity and IT security professional organization. It addresses the exam topics in detail including information security concepts and industry best practices, and covers the eight domains of the official CISSP CBK (Common Body of Knowledge)....
$19.99
Security Best Practices in Google Cloud
by Google Cloud Training- 4.6
Approx. 13 hours to complete
This self-paced training course gives participants broad study of security controls and techniques on Google Cloud. Through recorded lectures, demonstrations, and hands-on labs, participants explore and deploy the components of a secure Google Cloud solution, including Cloud Storage access control technologies, Security Keys, Customer-Supplied Encryption Keys, API access controls, scoping, shielded VMs, encryption, and signed URLs....
Mitigating Security Vulnerabilities on Google Cloud
by Google Cloud Training- 4.7
Approx. 8 hours to complete
They also learn about the Security Command Center, cloud logging and audit logging, and using Forseti to view overall compliance with your organization's security policies. Welcome to Mitigating Security Vulnerabilities on Google Cloud Security Partner Products Security Command Center overview Demo: Using Security Command Center...