Search result for Device and data security Online Courses & Certifications
Get Course Alerts by Email
Systems and Application Security
by (ISC)² Education & Training- 4.8
Approx. 17 hours to complete
Welcome to Systems and Application Security Course! In the Systems and Application Security Course, you will gain an understanding of computer code that can be described as harmful or malicious. You will learn concepts in endpoint device security, cloud infrastructure security, securing big data systems, and securing virtual environments. Implement and Operate Endpoint Device Security...
Cyber Security in Manufacturing
by Shambhu Upadhyaya- 4.7
Approx. 22 hours to complete
The nature of digital manufacturing and design (DM&D), and its heavy reliance on creating a digital thread of product and process data and information, makes it a prime target for hackers and counterfeiters. Shipping, RFID tags, Mobile Device Security and Wireless Communication - Part 1 Shipping, RFID tags, Mobile Device Security and Wireless Communication - Part 2...
Palo Alto Networks Academy Cybersecurity Foundation
by James Dalton- 4.7
Approx. 12 hours to complete
In this course, students will learn the fundamentals of cybersecurity and identify the concepts required to recognize and potentially mitigate attacks against enterprise networks as well as mission critical infrastructure. Foundation Module 2: Cyber-Landscape Careers and Common Attacks Compliance and Security Foundation Module 7 - Cloud and Data Center Security Video: Data Center Security Data Center Security...
Security Operations and Administration
by (ISC)² Education & Training- 4.8
Approx. 16 hours to complete
Security operations and administration is the task of identifying an organization's information assets and the documentation needed for policy implementation, standards, procedures, and guidelines to ensure confidentiality, integrity, and availability. You will understand the process necessary for working with management and information owners, custodians, and users so that proper data classifications are defined....
Security and Privacy for Big Data - Part 1
by Enrique Barra , Fabian Garcia Pastor- 4.6
Approx. 1 hour to complete
This course sensitizes regarding security in Big Data environments. SECURITY AND PRIVACY FOR BIG DATA - PART 1 Implementing security for Big Data Recognize all security related issues in big data systems and projects. Define cryptographic principles and mechanisms to manage access controls in your Big Data system. Explain security risks and challenges for Big Data system....
Cyber Threat Intelligence
by IBM Security Learning Services- 4.7
Approx. 29 hours to complete
• Discuss data loss prevention and endpoint protection concepts and tools. • Explore a data loss prevention tool and learn how to classify data in your database environment. • Describe security vulnerability scanning technologies and tools. • Recognize application security threats and common vulnerabilities. What is Data Security and Protection Data Security and Protection Knowledge Check...
Protecting Cloud Architecture with Alibaba Cloud
by Steve Xue- 0.0
Approx. 12 hours to complete
The Security Exam Preparation Course is a series of online courses covering topics including Linux and Windows OS basics and operations, network fundamentals, host security, application security, network security, and data security. Cloud Platform Security Overview: https://edu. Data Security Data Security Overview Data Security Best Practice Data Security Recap Security ACA and ACP Introduction...
Related searches
Networks and Communications Security
by (ISC)² Education & Training- 4.7
Approx. 20 hours to complete
Welcome to Networks and Communications Security Course! In the Networks and Communications Security Course, you will learn about the network structure, data transmission methods, transport formats, and the security measures used to maintain integrity, availability, authentication, and confidentiality of the information being transmitted. Network-Based Security Devices: FIN, NULL, and XMAS Scanning...
Introduction to Cloud Identity
by Google Cloud Training- 4.6
Approx. 11 hours to complete
Introduction to Cloud Identity serves as the starting place for any new Cloud Identity, Identity/Access Management/Mobile Device Management admins as they begin their journey of managing and establishing security and access management best practices for their organization. • Explore and apply different security protocols to the domain. Exercise #3 - View and Manage your Users’ Security Settings...
Security Awareness Training
by (ISC)² Education & Training- 4.6
Approx. 2 hours to complete
The security of an organization is of the utmost importance and every member of the organization's staff plays a vital role in defending against cyber threats. • Data and Account Security • Networking and Mobile Security Data and Account Security Data and Account Security Networking and Mobile Security Network and Security...