Search result for Device and data security Online Courses & Certifications
Get Course Alerts by Email
The Absolute Beginners 2021 Guide to Cyber Security - Part 3
by Alexander Oni- 4.5
2 hours on-demand video
Learn basic to advanced techniques on how to properly secure and protect your mobile device against malware and hackers ** PART 3 OF THE BEST SELLING CYBER SECURITY GUIDE FOR BEGINNERS SERIES ** How to install and configure a virtual private network on your mobile device How to properly tweak and change the default security settings of your android device...
$22.99
Cyber Forensics Level 4
by Tanmay S Dikshit- 0.0
1 hour on-demand video
Understand Security Architecture and Models and OS Security In this course you will learn the basic concepts of Security Architecture and Models, System and OS Security. Computer forensics is the application of investigation and analysis techniques to gather and preserve evidence from a particular computing device in a way that is suitable for presentation in a court of law....
$12.99
Cybersecurity and Mobility
by Dr. Humayun Zafar, CEH, CISM, CRISC, PCIP- 4.5
Approx. 14 hours to complete
Effective cybersecurity must be multi-dimensional and tiered, as threats can originate from virtually anywhere, target numerous levels of an organization, and sometimes persist for months or years before an information security staff is aware of an attack or breach. SAP's Chris and Mandy on Corporate Mobility Trends Effective Information Security Requires a Balance of Social and Technology Factors....
Building Database Applications in PHP
by Charles Russell Severance- 4.9
Approx. 24 hours to complete
You'll learn how to connect to a MySQL using the Portable Data Objects (PDO) library and issue SQL commands in the the PHP language. We'll also look at how PHP uses cookies and manages session data. Connecting PHP and MySQL Code Walkthrough - Inserting and Deleting Data Code Walkthrough - Security and SQL Injection...
Business Considerations for Edge Computing
by Jennifer Cloer , Gary Schillinger- 0.0
7 Weeks
Edge Computing utilizes real-time processing and data analysis at the edge of the network - nearest the device or user - in order to enable digital transformation and power new technologies. We’ll review the data privacy and security considerations and share examples of where we see business innovation with Edge. What Edge Computing is and what is driving its adoption...
$149
MD-101: Managing Modern Desktops - Real Exam Questions
by Kenan Bülbül- 4.1
Deploy and update operating systems (15-20%) Plan and implement Windows 10 by using dynamic deployment extract device HW information to CSV file import device HW information to cloud service identify upgrade and downgrade paths Manage device authentication Manage Intune device enrollment and inventory monitor device security Manage apps and data (25-30%)...
$12.99
Penetration Testing - Post Exploitation
by Aspen Olmsted- 0.0
5 Weeks
Information Security - Introduction to Information Security Information Security - Authentication and Access Control Among the topics covered are Owning, Pivoting, Privilege Escalation and other advanced penetration testing topics, The purpose of the Post-Exploitation phase is to determine the value of the machine compromised and to maintain control of the device for later use....
$166
Related searches
Android Basics: Networking
by Chris Lei , Joe Lewis- 0.0
Approx. 5 weeks
Get practice reading API documentation and learn how to request data from an API using a web browser. lesson 2 HTTP Networking Harness the essentials of the Hypertext Transfer Protocol to exchange data between an Android device and a web server. Get a comprehensive overview of AsyncTask and Loaders two important threading options exposed by the Android Framework....
Free
Enterprise System Management and Security
by Greg Williams- 4.7
Approx. 12 hours to complete
You will also be able to discuss the three pillars of the CIA triad and how they apply to enterprise systems. Don't I just trust what Apple, Microsoft, and the other guys tell me? Personal and Enterprise Computing Network Addressing and Subnetting Explained from Cisco Addressing and Sub-netting Practice Confidentiality and data breaches...
Artificial Intelligence Privacy and Convenience
by Brent Summers- 4.6
Approx. 6 hours to complete
In this course, we will explore fundamental concepts involved in security and privacy of machine learning projects. We will also ask big questions about how businesses implement algorithms and how that affects user privacy and transparency now and in the future. Privacy and convenience vs big data Protecting Privacy: Theories and Methods Dataset Security...