Search result for Device and network security Online Courses & Certifications
Get Course Alerts by Email
Networks and Communications Security
by (ISC)² Education & Training- 4.7
Approx. 20 hours to complete
Welcome to Networks and Communications Security Course! In the Networks and Communications Security Course, you will learn about the network structure, data transmission methods, transport formats, and the security measures used to maintain integrity, availability, authentication, and confidentiality of the information being transmitted. Network-Based Security Devices: FIN, NULL, and XMAS Scanning...
Cyber Security in Manufacturing
by Shambhu Upadhyaya- 4.7
Approx. 22 hours to complete
Network Security and Authentication - Part 1 Network Security and Authentication - Part 2 Additional (optional) Resources: Network Security and Authentication, Part 1 Additional (optional) Resources: Network Security and Authentication, Part 2 Shipping, RFID tags, Mobile Device Security and Wireless Communication - Part 1 Shipping, RFID tags, Mobile Device Security and Wireless Communication - Part 2...
Systems and Application Security
by (ISC)² Education & Training- 4.8
Approx. 17 hours to complete
Welcome to Systems and Application Security Course! In the Systems and Application Security Course, you will gain an understanding of computer code that can be described as harmful or malicious. Implement and Operate Endpoint Device Security Operate and Secure Virtual Environments: Network Security Operate and Secure Virtual Environments: Virtual Machine Security Operate and Secure Virtual Environments: Network Security...
Palo Alto Networks Academy Cybersecurity Foundation
by James Dalton- 4.7
Approx. 12 hours to complete
Foundation Module 2: Cyber-Landscape Careers and Common Attacks Foundation Module 6 - Network Security Models Video: Network Security Models I Video: Network Security Models II Network Security Models Compliance and Security Foundation Module 7 - Cloud and Data Center Security Video: Network Security Devices I Video: Network Security Devices II Network Security Technologies I Network Security Technologies II...
Managing Network Security
by Herbert J. Mattord, Ph.D., CISM, CISSP, CDP , Michael Whitman, Ph.D., CISM, CISSP- 4.7
Approx. 15 hours to complete
● Identify the issues and practices associated with managing network security ● Identify the practices, tools, and methodologies associated with assessing network security Cryptography and Network Security Cryptography and Network Security Identify the issues and practices associated with managing network security Identify the practices, tools, and methodologies associated with assessing network security...
Cloud Security Basics
by Rick Smith- 4.7
Approx. 13 hours to complete
We'll learn and apply classic security techniques to today’s cloud security problems. We’ll build our own web service case studies and construct security solutions for them. Network Layers and Addressing Step 6 and Cloud Security Deployment Models and Security Cloud Architecture and Security Planning Learn and apply basic network security techniques in the cloud environment....
Protecting Cloud Architecture with Alibaba Cloud
by Steve Xue- 0.0
Approx. 12 hours to complete
The Security Exam Preparation Course is a series of online courses covering topics including Linux and Windows OS basics and operations, network fundamentals, host security, application security, network security, and data security. Cloud Platform Security Overview: https://edu. Cyber Security Today Security Risk Evaluation Network Security Network Security Security ACA and ACP Introduction...
Related searches
Architecting Smart IoT Devices
by Martin Timmerman , Maarten Weyn- 4.3
Approx. 34 hours to complete
At the end of the course you will be ready to start architecting and implementing your own embedded device! You'll learn how to debug and finetune your device and how to make it run on a low power supply. Debugging basics: Thread and Device Drivers Testing and Device Simulation White- and black-box testing...
Information Security: Context and Introduction
by Professor Peter Komisarczuk , Professor Keith M. Martin , Dr Jorge Blasco Alis- 4.7
Approx. 24 hours to complete
This includes a brief introduction to cryptography, security management and network and computer security that allows you to begin the journey into the study of information security and develop your appreciation of some key information security concepts. Information and security This video introduces the core information security services and tools provided by cryptography. Network and Computer Security...
Real-Time Cyber Threat Detection and Mitigation
by Dr. Edward G. Amoroso- 4.7
Approx. 15 hours to complete
This course introduces real-time cyber security techniques and methods in the context of the TCP/IP protocol suites. Explanation of some basic TCP/IP security hacks is used to introduce the need for network security solutions such as stateless and stateful firewalls. TCP/IP Evolution and Security More Advanced Network Security Technologies Required: “Anomaly-based Network Intrusion Detection: Techniques, Systems, and Challenges....