Search result for Access control course Online Courses & Certifications
Get Course Alerts by Email
Access Controls
by (ISC)² Education & Training- 4.7
Approx. 15 hours to complete
The Access Controls Course provides information pertaining to specify what users are permitted to do, the resources they are allowed to access, and what operations they are able to perform on a system. Authentication Mechanisms: Access Control Lists/Matrix Authentication Mechanisms: Access Control Lists/ Matrix Implement Access Controls: Mandatory Access Control Access Controls Course Assessment...
Peer-to-Peer Protocols and Local Area Networks
by Xiaobo Zhou- 4.7
Approx. 16 hours to complete
We focus on several medium access control protocols and their performance analysis. In the second part, we discuss how medium access control protocols coordinate the access to the communication channel so that information gets through from a source to a destination in the same broadcast local area network. Medium access control...
Cybersecurity and Its Ten Domains
by Dr. Humayun Zafar, CEH, CISM, CRISC, PCIP- 4.3
Approx. 24 hours to complete
This course is designed to introduce students, working professionals and the community to the exciting field of cybersecurity. Welcome and Course Overview Welcome to the Course Course Objectives Introduction to Security, Access Control, and Software Development Security Access Control Introduction to Security, Access Control, and Software Development Security Quiz Course Certificate Final Exam...
Networks and Communications Security
by (ISC)² Education & Training- 4.7
Approx. 20 hours to complete
Course Objectives Protect Telecommunications Technologies and Control Network Access Control Network Access: Access Control and Monitoring Control Network Access: Blind Spoofing Control Network Access: Bastion Host Control Network Access: Access Control and Monitoring LAN-Based Security: Separation of Data Plane and Control Plane LAN-Based Security: Separation of Data Plane and Control Plane End-Of Course Assessment...
Windows Server Management and Security
by Greg Williams- 4.7
Approx. 12 hours to complete
This course explores what it takes to design and build the server side of Windows in an enterprise environment. This course will explore everything from Windows Server installation to configuring users, to hardening the server operating system itself. About This Course Access Control Restricting access to software and resources Course Project - Kerberos...
Microsoft Azure Services and Lifecycles
by Microsoft- 4.8
Approx. 8 hours to complete
In this course, you will learn how Microsoft Azure can help you secure access to cloud resources, what it means to build a cloud governance strategy, and how Microsoft Azure adheres to common regulatory and compliance standards. This course can help you prepare for AZ-900: Microsoft Azure Fundamentals exam. Control access to cloud resources by using Azure role-based access control...
Modeling and Control of Single-Phase Rectifiers and Inverters
by Dr. Dragan Maksimovic- 0.0
Approx. 14 hours to complete
This course can also be taken for academic credit as ECEA 5709, part of CU Boulder’s Master of Science in Electrical Engineering degree. This is Course #5 in the Modeling and Control of Power Electronics Specialization. The course is focused on modeling and control of grid-tied power electronics. ● Model and design control loops in single-phase dc-to-ac inverters...
Introduction to using Git
by Laurence Svekis- 4
2 hours on-demand video
Course features Git access with GUI and CLI Git is a version control system used for web development. This course is perfect for anyone who wants to learn more about Git. This part of the course is designed around users who want to know about git but don't want to use command lines to access it....
$12.99
Hands-On Labs in Google Cloud for Security Engineers
by Google Cloud Training- 0.0
Approx. 5 hours to complete
In this course you will get added hands-on practice understanding and securing resources with multiple Google Cloud services including Google Kubernetes Engine (GKE). This course is unlike other courses, in that it consists of one module of background videos, followed by a series of hands-on practice exercises on Google Cloud via Qwiklabs. Using Role-based Access Control in Kubernetes Engine...
Architecting with Google Kubernetes Engine: Production
by Google Cloud Training- 4.7
Approx. 12 hours to complete
Course Introduction Course introduction Access Control and Security in Kubernetes and Google Kubernetes Engine (GKE) Kubernetes Control Plane Security Kubernetes control plane security Access Control and Security in Kubernetes and GKE Production Course Resources Define Identity and Access Management roles for GKE, as well as Kubernetes pods security policies...