Search result for Network tools and technologies Online Courses & Certifications
Get Course Alerts by Email
Networks and Communications Security
by (ISC)² Education & Training- 4.7
Approx. 20 hours to complete
In the Networks and Communications Security Course, you will learn about the network structure, data transmission methods, transport formats, and the security measures used to maintain integrity, availability, authentication, and confidentiality of the information being transmitted. Protect Telecommunications Technologies and Control Network Access Manage LAN-Based Security and Implement and Operate Wireless Technologies...
Intel® Network Academy - Network Transformation 101
by Intel Network Academy- 4.5
Approx. 18 hours to complete
In this program, we will be covering the topic areas of software defined infrastructure (SDI) network functions virtualization (NFV), software-defined networking (SDN) and beyond. The Evolution of Mobile Wireless Network – Toward 5G and IoT Virtualization and Automation of the Network Network Functions Virtualization (NFV) and Virtual Network Functions (VNFs) 5G Network Architecture and Challenges Design Imperatives and Network Slicing...
Managing Network Security
by Herbert J. Mattord, Ph.D., CISM, CISSP, CDP , Michael Whitman, Ph.D., CISM, CISSP- 4.7
Approx. 15 hours to complete
When we allow network access to data it is exposed to threats from inside and outside of the organization. ● Identify the issues and practices associated with managing network security TCP/IP and Ethernet Network Protocols TCP/IP and Ethernet Network Protocols Cryptography and Network Security Cryptography and Network Security Additional Wireless Network Standards and Technologies Additional Wireless Network Standards and Technologies...
Computer Networks Security from Scratch to Advanced
by Mohammad Adly- 3.9
8 hours on-demand video
Computer Networks Security Technologies and Tools for Network Admins and Cyber Security Officers Lecture 2: Application, Presentation, and Session LayersLecture 3: Transport and Network LayersLecture 4: Data Link and Physical LayersLecture 5: ISO/OSI Model in Action Lecture 1: Security GoalsLecture 2: Securing the Network DesignLecture 3: TCP/IP Security and ToolsLecture 4: Port Scanning and ToolsLecture 5: Sniffing and Tools...
$17.99
The Bits and Bytes of Computer Networking
by Google Career CertificatesTop Instructor- 4.7
Approx. 34 hours to complete
We’ll cover everything from the fundamentals of modern networking technologies and protocols to an overview of the cloud to practical applications and network troubleshooting. ● grasp powerful network troubleshooting tools and techniques ● learn network services like DNS and DHCP that help make computer networks run Network Ports and Patch Panels Wide Area Network Technologies...
Nanotechnology: A Maker’s Course
by Nan M. Jokerst , Carrie Donley , James Cahoon , Jacob Jones- 4.8
Approx. 26 hours to complete
To become a Nanotechnology Maker pioneer, we will introduce you to the practical knowledge, skills, and tools that can turn your nanotechnology ideas into physical form and that enable you to image objects at the nano-scale. Introduction and Essential Technologies for Nano Research Triangle Nanotechnology Network Nanofabrication: Patterning and Self-Assembly Ion Beam: Milling and Sectioning Demonstration...
Solve Business Problems with AI and Machine Learning
by Renée Cummings- 0.0
Approx. 11 hours to complete
When used effectively, these tools provide actionable insights that drive critical decisions and enable organizations to create exciting, new, and innovative products and services. In addition, you'll get an overview of the general workflow involved in machine learning, as well as the tools and other resources that support it. New Tools and Technologies Open Source and Proprietary AI Tools Quiz...
Related searches
Palo Alto Networks Academy Cybersecurity Foundation
by James Dalton- 4.7
Approx. 12 hours to complete
In this course, students will learn the fundamentals of cybersecurity and identify the concepts required to recognize and potentially mitigate attacks against enterprise networks as well as mission critical infrastructure. Foundation Module 2: Cyber-Landscape Careers and Common Attacks Video: Spamming and Phishing CyberSecurity Threats and Opportunities Network Security Technologies I Network Security Technologies II...
Cyber Security in Manufacturing
by Shambhu Upadhyaya- 4.7
Approx. 22 hours to complete
Network Security and Authentication - Part 1 Network Security and Authentication - Part 2 Additional (optional) Resources: Network Security and Authentication, Part 1 Additional (optional) Resources: Network Security and Authentication, Part 2 Protecting Operational Technologies and Intellectual Property Protecting Operational Technologies and Intellectual Property - Part 1 Protecting Operational Technologies and Intellectual Property - Part 2...
Networking for Web Developers
by Karl Krueger- 0.0
Approx. 2 weeks
As a web developer, it's handy to know a bit about the TCP/IP stack, IP addressing, DNS, and other protocols that underlie the Web technologies you use. lesson 3 Addressing and Networks Network blocks and interfaces. Network address translation (NAT). lesson 4 Protocol Layers Use tcpdump to examine the packets that make up the requests and responses....
Free