Search result for Security tools and techniques Online Courses & Certifications
Get Course Alerts by Email
Nuclear Knowledge Management
by Куликов Евгений Геннадьевич- 4.9
Approx. 16 hours to complete
KM Elements, Importance, Benefits, Tools and Techniques KM Elements, Importance, Benefits, Tools and Techniques Techniques to Identify, Capture and Transfer Tacit Knowledge. Techniques to Identify, Capture and Transfer Tacit Knowledge. Techniques to Identify, Capture and Transfer Tacit Knowledge. Techniques to Identify, Capture and Transfer Tacit Knowledge. Application of nuclear knowledge management methods and tools in practice...
Business Analyst: Project Management Techniques and Tools
by The BA Guide | Jeremy Aschenbrenner- 4.5
5 hours on-demand video
Learn project management techniques to increase your project success rate as a Business Analyst! Course enrollment includes activities, handouts, quizzes, 1-on-1 expert support, LIFETIME access, and a 100% money-back guarantee! I enjoy Jeremy's personality, and I can tell that he really enjoys helping others learn and giving them the tools to help them progress in their careers....
$15.99
Creative Thinking: Techniques and Tools for Success
by Peter Childs- 0.0
7 Weeks
Learn how to apply tools and techniques to better solve problems, generate ideas, and excel in your chosen career. You can pick and choose which of these tools or techniques suit your needs and interests, focusing on some or all of the selected approaches and in the order that fits best for you....
$49
Creative Thinking: Techniques and Tools for Success
by Peter Childs- 4.7
Approx. 20 hours to complete
This course will equip you with a ‘tool-box’, introducing you to a selection of behaviours and techniques that will augment your innate creativity. You can pick and choose which of these tools or techniques suit your needs and interests, focusing on some or all of the selected approaches and in the order that fits best for you....
Identifying Patient Populations
by Laura K. Wiley, PhD- 4.5
Approx. 13 hours to complete
You will also learn how to program different data manipulations and combinations to increase the complexity and improve the performance of your algorithms. Manual Record Review: Tools and Techniques Accessing Course Data and Technology Platform Methods - Creating Review Instruments and Protocols Techniques: Data Manipulations and Combinations Techniques: Algorithm Selection and Portability...
Advanced Manufacturing Enterprise
by Sara Behdad- 4.6
Approx. 18 hours to complete
Enterprises that seek to become proficient in advanced manufacturing must incorporate manufacturing management tools and integrate data throughout the supply chain to be successful. Students will become acquainted with the available tools, technologies and techniques for aggregation and integration of data throughout the manufacturing supply chain and entire product life-cycle. Resources: Definition of Resilient and Adaptable Enterprise...
Solve Business Problems with AI and Machine Learning
by Renée Cummings- 0.0
Approx. 11 hours to complete
When used effectively, these tools provide actionable insights that drive critical decisions and enable organizations to create exciting, new, and innovative products and services. In addition, you'll get an overview of the general workflow involved in machine learning, as well as the tools and other resources that support it. New Tools and Technologies Open Source and Proprietary AI Tools Quiz...
Related searches
Data Visualization in Excel
by Nicky Bull , Dr Prashan S. M. Karunaratne- 4.9
Approx. 18 hours to complete
It offers a wealth of tools for creating visualizations other than charts and the chart options available are constantly increasing and improving, so the newer versions now include waterfall charts, sunburst diagrams and even map charts. Week 1: Dynamic visualizations with conditional formatting, custom number formatting, sparklines and macros Dashboard planning and layout Dashboard drilldowns and protection...
Hacking and Patching
by Edward Chow- 3.9
Approx. 15 hours to complete
You will learn a security design pattern to avoid introducing injection vulnerabilities by input validation and replacing generic system calls with specific function calls. You will learn security in memory systems and virtual memory layout, and understand buffer overflow attacks and their defenses. Security in Memory Systems and Virtual Memory Layout...
Master in Wi-Fi ethical Hacking
by MBPSec Tech- 3.5
2 hours on-demand video
WiFi Hacking and Pentesting First of all this course is based on the latest tools and complete practical base. This course on Wi-Fi hacking explains the different techniques, which you can hack the WEP, WPA/WPA2 and WPS Wi-Fi router. Continuously updated with new techniques, attacks and Security. Cracking a wireless network is defeating the security of a wireless LAN....
$14.99