Search result for Device and network security Online Courses & Certifications
Get Course Alerts by Email
Business Considerations for Edge Computing
by Jennifer Cloer , Gary Schillinger- 0.0
7 Weeks
Edge Computing utilizes real-time processing and data analysis at the edge of the network - nearest the device or user - in order to enable digital transformation and power new technologies. We’ll review the data privacy and security considerations and share examples of where we see business innovation with Edge. What Edge Computing is and what is driving its adoption...
$149
Real-Time Mission-Critical Systems Design
by Sam Siewert- 0.0
Approx. 50 hours to complete
● Thorough understanding of hardware/software device interfaces and resource view for hardware abstraction layers (HAL, BSP) Device I/O interfaces and Drivers for Real-time Systems Course Goals and Learning Objectives Drivers and Device Interfaces Using Linux UVC Driver to Acquire Video Frames with OpenCV and V4L2 Quiz 1 - Device Interfaces and Software Drivers Tracing Linux kernel and network stack events...
Basic Network and Database Security
by Coreen Ryskamp- 0.0
4 Weeks
Build a background needed to understand basic network security and learn how to safeguard your organization from cybersecurity attacks. You will learn how networking affects security systems within an organization and network security controls that guard an organization from cybersecurity attacks. Discuss Layer 2 and Layer 3 network addressing. Understand IP addressing, network address translation and packet sniffing....
$149
Interfacing with the Raspberry Pi
by Ian Harris- 4.7
Approx. 12 hours to complete
The Raspberry Pi uses a variety of input/output devices based on protocols such as HDMI, USB, and Ethernet to communicate with the outside world. ) to get your IoT device to interact with the real world. 1 - Network (Updated) 2 - Network Programs 1 - Network Libraries...
Network Security - Advanced Topics
by Aspen Olmsted- 0.0
5 Weeks
Learn advanced topics in network security, including Security Monitoring, Perimeter Security, IPv6 and IPv6 Security. This is a self-paced course that provides a continuation of network security topics. Among the topics covered are Security Monitoring, Perimeter Security, IPv6, and IPv6 Security. Explain what information is collected and analyzed through network security monitoring, and why monitoring is important...
$166
Cybersecurity and Mobility
by Dr. Humayun Zafar, CEH, CISM, CRISC, PCIP- 4.5
Approx. 14 hours to complete
Effective cybersecurity must be multi-dimensional and tiered, as threats can originate from virtually anywhere, target numerous levels of an organization, and sometimes persist for months or years before an information security staff is aware of an attack or breach. SAP's Chris and Mandy on Corporate Mobility Trends Effective Information Security Requires a Balance of Social and Technology Factors....
Computer Networks Security from Scratch to Advanced
by Mohammad Adly- 3.9
8 hours on-demand video
Computer Networks Security Technologies and Tools for Network Admins and Cyber Security Officers Lecture 1: Security GoalsLecture 2: Securing the Network DesignLecture 3: TCP/IP Security and ToolsLecture 4: Port Scanning and ToolsLecture 5: Sniffing and Tools Lecture 1: Confidentiality, Integrity, and Availability (CIA)Lecture 2: Assets, Threats, and VulnerabilitiesLecture 3: Risks and Network IntrusionLecture 4: Common AttacksLecture 5: Security Recommendations...
$17.99
Related searches
Ethical Hacking:Network Fundamentals & Network Layer Attacks
by Muharrem AYDIN- 4.4
7 hours on-demand video
Learn Ethical Hacking with Network Security, Sniffing,Subnetting, ARP Spoof, Password Cracking and implement MitM attack The Certified Ethical Hacker (CEH) certification exam supports and tests the knowledge of auditors, security officers, site administrators, security professionals, and anyone else who wants to ensure a network is safe against cybercriminals. Network Device Audits...
$21.99
Internet History, Technology, and Security
by Charles Russell Severance- 4.8
Approx. 15 hours to complete
The impact of technology and networks on our lives, culture, and society continues to increase. At a minimum, you will be a much wiser network citizen. High Stakes Research in Computing, and Communication Security - Encryption and Confidentiality Security - Integrity and Signatures Security : Encrypting and Signing Security - Integrity and Certificate Authorities...
Fundamentals of Network Security
by Harish Kumar Maheshwari- 3.8
31 mins on-demand video
Here we will discuss on Network Security, OSI model, Network Attack and Protection Don’t be stressed, take our Network Security Course and prepare yourself for your Interview Network security is the practices and technology a business puts in place to protect its IT infrastructure. A solid network security system helps reduce the risk of data loss and theft....
$14.99