Search result for Security tools Online Courses & Certifications
Get Course Alerts by Email
Microsoft MTA Security Fundamentals: 98-367
by Marious Kuriata- 0.0
6.5 hours on-demand video
·Fundamentals of Security Layers ·How to remove viruses and spyware ·Windows Operating System Security ·Network Security (firewalls, UTM, VPNs) ·Security Software Solutions ·Wireless security ·Troubleshooting tools and tips ·Quizzes to help you pass the exam The course is perfect for anyone who seeks to learn the security fundamentals. Master IT Security Concepts...
$14.99
CompTIA Cybersecurity Analyst (CySA+) Express Bootcamp
by Joseph Holbrook (The Cloud Tech Guy)- 0.0
9.5 hours on-demand video
Ive been teaching Cloud Security Manager, Security Plus, CASP and CSA to hundreds of Dept of Defense professionals. As attackers have learned to evade traditional signature-based solutions such as firewalls, an analytics-based approach within the IT security industry is increasingly important for most organizations. CompTIA CSA+ is for IT professionals looking to gain the following security analyst skills:...
$12.99
Android Hacking And Penetration Testing
by Js Infosec- 3.3
8 hours on-demand video
The course will focus on the tools and techniques for testing the Security of Android Mobile applications. He is a Cyber Security Enthusiast, writer and a Speaker. His area of Interests Include Wireless Security and Penetration Testing, Android Security & Forensics...
$12.99
Quantum Cryptography
by Stephanie Wehner , Thomas Vidick , Guest Lecturers- 0.0
10 Weeks
Learn how quantum communication provides security that is guaranteed by the laws of nature. Cryptographic concepts and tools: security definitions, the min-entropy, privacy amplification Protocols and proofs of security for quantum key distribution...
$50
Basics of Network Security
by Christo Panchev , John Filippas , Antal Goldschmidt- 0.0
2
Explore the basic concepts of networks and network security and the tools used by network engineers and attackers. The basic principles of network security and cyber attacksReal-world security case studiesProtecting assetsIntrusion detection systemsAssessing security threats from a practical and theoretical viewpoint...
Free
Excel To EXE, Make Secure Windows Applications From Excel
by Daniel Strong- 4.8
4.5 hours on-demand video
Go Beyond Excel's Built-In Security Tools, Boost Features, Lock Down & Create Windows Applications (EXE) with XLSPadlock In my course, I show you how to turn your Excel workbooks into actual Windows Executable programs (EXE FILES) using my secret Excel weapon – XLSPadlock! This course includes a complete walkthrough of XLSPadlock along with little known Excel security techniques....
$13.99
CCNA Security Real World Labs - Cisco ASA, Network Security
by Marious Kuriata- 0.0
12.5 hours on-demand video
Cisco Security Training is rapidly becoming )UTM devicesWireless security (WPA Enterprise)DoS and Man-in-the-middle AttacksChallenges and GNS3/Packet Tracer labsMonitoring Tools and Remote Support SoftwareA lot of real world examples world examples and goes beyond CCNA Security topics to cover a lot of Remember: hiring managers view network security...
$14.99
Related searches
OWASP Proactive Controls
by Stone River eLearning- 0.0
3 hours on-demand video
The OWASP: Proactive Controls course is part of a series of training courses on the Open Web Application Security Project (OWASP). The OWASP Top Ten Proactive Controls is a list of security techniques that should be included in every software development project....
$12.99
EC-Council Certified Network Defender Practice Exam (CND v2)
by Viktor Afimov- 0.0
Network security management Network security policies and procedures Windows and Linux security administration Mobile and IoT device security Data security techniques Virtualization technology security Cloud and wireless security Risk assessment tools Endpoint security...
$12.99
IT Security and Ethical Hacking
by LearnSmart LLC- 0.0
26 hours on-demand video
Welcome to our IT Security and Ethical Hacking Course. You will spend time concentrating on each knowledge area, and studying the tools and techniques, inputs, and outputs associated with each knowledge area. Sections 5-7: You will gain a comprehensive understanding of vulnerability assessment and the tools used in this process....
$199.99