Search result for Basic access control training Online Courses & Certifications
Get Course Alerts by Email
Access Controls
by (ISC)² Education & Training- 4.7
Approx. 15 hours to complete
You will understand the different access control systems and how they should be implemented to protect the system and data using the different levels of confidentiality, integrity, and availability. Authentication Mechanisms: Access Control Lists/Matrix Authentication Mechanisms: Access Control Lists/ Matrix Implement Access Controls: Mandatory Access Control Implement Access Controls: Rule-Set Based and Role-Based Access Control...
Cybersecurity Roles, Processes & Operating System Security
by IBM Security Learning Services- 4.6
Approx. 15 hours to complete
This course gives you the background needed to understand basic Cybersecurity around people. ● Describe the architecture, file systems, and basic commands for multiple operating systems including Windows, Mac/OS, Linux and Mobile. Authentication and Access Control Introduction to Authentication and Access Control Access Control Methods Access Control - Physical and Logical Access Control Authentication and Access control...
Training and Learning Programs for Volunteer Community Health Workers
by William Brieger, DrPH- 4.7
Approx. 16 hours to complete
Volunteer community health workers (CHWs) are a major strategy for increasing access to and coverage of basic health interventions. Our village health worker training course reviews the process of training and continuing education of CHWs as an important component of involving communities in their own health service delivery. Lecture 3D: Training Needs to Deliver a Basic Package of Services...
Networks and Communications Security
by (ISC)² Education & Training- 4.7
Approx. 20 hours to complete
Protect Telecommunications Technologies and Control Network Access Control Network Access: Access Control and Monitoring Control Network Access: Blind Spoofing Control Network Access: Bastion Host Control Network Access: Wired Transmissions Control Network Access: Access Control and Monitoring LAN-Based Security: Separation of Data Plane and Control Plane LAN-Based Security: Separation of Data Plane and Control Plane...
MS Office 2010 Complete Training - Beginner to Expert Level
by Himanshu Dhar- 0.0
10.5 hours on-demand video
Complete Practical training from the basic to the advance level in MS Excel, Word, PowerPoint and Access. Most of us are aware of MS Word, Excel, PowerPoint & Access but are not efficient, as we dont give so much importance to it and got stuck in workplace because of the lack of knowledge....
$12.99
Science of Training Young Athletes Part 2
by Dr. Chris Brooks- 5
Approx. 25 hours to complete
In this course you will learn how to design the type of training that takes advantage of the plastic nature of the athlete’s body so you mold the right phenotype for a sport. Growth Versus Training Control Mechanisms Training Safely Training effect on human growth hormone Heart control evolution Training continuum...
Design and Analyze Secure Networked Systems
by Edward Chow- 3.8
Approx. 15 hours to complete
In this MOOC, we will learn the basic cyber security concepts, how to identify vulnerabilities/threat in a network system. We will apply CIA basic security services in the triage of recent cyberattack incidents, such as OPM data breach. Apply Principle of Least Privileges for Access Control Apply Principle of Least Privileges for Access Control...
Related searches
Know Your Voice
by Anette Norgaard- 5
1 hour on-demand video
Learn How to Access Your Expressive and Authentic Voice Learn how to build and access your full vocal potential with these basic vocal exercises for finding Core-sound including; breath management, laryngeal control, manipulation of filters and resonators and language and tongue workouts....
$12.99
Introduction to Cloud Identity
by Google Cloud Training- 4.6
Approx. 11 hours to complete
This 15-30 hour accelerated, one-week course will leave you feeling confident to utilize the basic functions of the Admin Console to manage users, control access to services, configure common security settings, and much more. Exercise #2: Access your Admin Console Cloud Identity Training Summary Case Study #1 - Enforcing Multi-Factor Authentication for Access to Company-Owned Resources...
Custom and Distributed Training with TensorFlow
by Laurence Moroney , Eddy Shyu- 4.8
Approx. 24 hours to complete
• Build your own custom training loops using GradientTape and TensorFlow Datasets to gain more flexibility and visibility with your model training. Basic Tensors code walkthrough Custom Training Custom Training Loop steps Define Training Loop and Validate Model Training Basics code walkthrough Training steps and data pipeline Define the training loop...