Search result for Device and data security Online Courses & Certifications
Get Course Alerts by Email
How Computers Work
by Dr Marco Gillies- 4.6
Approx. 10 hours to complete
Computers are everywhere, they aren't just the desktops and laptops we use for work but the phones in our pockets and even the watches on our wrists are also computers. You probably use a computer every day and in fact you are reading this on a computer! 3 Security and the Web...
Intro to Relational Databases
by Karl Krueger- 0.0
Approx. 4 weeks
Database systems such as PostgreSQL and MySQL have been part of the web developer's toolkit for many years, and remain some of the most powerful tools available for storing and manipulating structured data. lesson 1 Data and Tables Learn about how relational databases let you structure data into tables. Common security pitfalls of database applications including the famous Bobby Tables....
Free
EC-Council Certified Network Defender Practice Exam (CND v2)
by Viktor Afimov- 0.0
Network security management Network security policies and procedures Windows and Linux security administration Mobile and IoT device security Data security techniques Virtualization technology security Cloud and wireless security Basics of first response and forensics Indicators of Compromise, Attack, and Exposures (IoC, IoA, IoE) Endpoint security...
$12.99
Secure Networked System with Firewall and IDS
by Edward Chow- 3.8
Approx. 9 hours to complete
In this MOOC, we will focus on learning how network systems are secured using firewalls and IDS. This will include understanding the basic components of network security, constructing a dual-firewall DMZ, and defining security policies to implement and enforce these rules. Video: CNN - How Target Could Have Prevented Customer Data Hack...
Data Security, Recovery and Storage Hacking for Newbies
by Srinidhi Ranganathan- 0.0
1 hour on-demand video
Data Security is a mission-critical priority nowadays and has always been for IT teams in organizations of all sizes. This incredible course will teach you concepts on Data Security, Data Recovery, and Storage Hacking to the maximum. Customers can upload files in Cloud and share with anyone and access them at any time from any device in the world....
$12.99
CCNA Routing and Switching - The Easy Certification Guide
by Eduonix Learning Solutions- 0.0
10 hours on-demand video
Online security is a huge concern for a lot of companies, with many of them opting for multiple firewalls and various encryptions to keep their data safe from hackers. Technology giant, Cisco, has designed numerous certifications to determine the credibility of technicians and to test their knowledge regarding networks, security and creating a network from the ground up....
$12.99
Reliable Google Cloud Infrastructure: Design and Process
by Google Cloud Training- 4.7
Approx. 8 hours to complete
This course equips students to build highly reliable and efficient solutions Choosing Google Cloud Storage and Data Solutions Activity Intro: Choosing Google Cloud storage and data services Activity Review: Choosing Google Cloud storage and data services Activity Intro: Cost estimating and planning Activity Review: Cost estimating and planning Maintenance and Monitoring...
Related searches
Cybersecurity and the Internet of Things
by Dr. Humayun Zafar, CEH, CISM, CRISC, PCIP , Andy Green, Ph.D. , Herbert J. Mattord, Ph.D., CISM, CISSP, CDP , Michael Whitman, Ph.D., CISM, CISSP- 4.6
Approx. 11 hours to complete
Security policies and practices have not yet caught up to the internet capabilities of some of our most common products. Welcome to Cybersecurity and the Internet of Things! Internet of Things – New security and privacy challenges A Survey on Internet of Things: Security and Privacy Issues Internet of Things in healthcare: Interoperability and security issues...
Industrial IoT Markets and Security
by David Sluiter- 4.7
Approx. 22 hours to complete
is and what factors have enabled the IIoT * What platforms are, and also market information on Software and Services * What the top application areas are (examples include manufacturing and oil & gas) * About computer security; encryption techniques and secure methods for insuring data integrity and authentication Platforms, Software and Services...
Internet History, Technology, and Security
by Charles Russell Severance- 4.8
Approx. 15 hours to complete
The impact of technology and networks on our lives, culture, and society continues to increase. High Stakes Research in Computing, and Communication Alan Turing and Bletchley Park Post-War Computing and Communication Security - Encryption and Confidentiality Security - Integrity and Signatures Security : Encrypting and Signing Security - Integrity and Certificate Authorities...