Search result for Security Online Courses & Certifications
Get Course Alerts by Email
Protecting Cloud Architecture with Alibaba Cloud
by Steve Xue- 0.0
Approx. 12 hours to complete
Cloud Platform Security Overview: https://edu. Cyber Security Today Security Risk Evaluation Alibaba Cloud Security Products Overview Security Products Demo Security Center Console Overview Security Overview Host Security Security Challenge to Hosts in Cloud Host Security Management 5 Key Points Windows Security Configuration Demo Network Security Application Security Cloud Application Security Overview...
Check Point Jump Start: Network Security
by Check Point Software Technologies- 0.0
Approx. 5 hours to complete
In this course brought to you by industry leader Check Point, they will cover cybersecurity threats and elements of Check Point's Security Management architecture. Deploying Check Point Security Management Deploying Check Point Security Management Deploying Check Point Security Gateways Deploying Check Point Security Gateways Creating a Security Policy Creating a Security Policy...
Cybersecurity and Its Ten Domains
by Dr. Humayun Zafar, CEH, CISM, CRISC, PCIP- 4.3
Approx. 24 hours to complete
Introduction to Security, Access Control, and Software Development Security Introduction to Security Software Development Security Introduction to Security, Access Control, and Software Development Security Quiz Information Security Governance and Risk Management & Legal, Regulations, Investigations, and Compliance Information Security Governance and Risk Management Information Security Governance and Risk Management & Legal, Regulations, Investigations, and Compliance Quiz...
Information Security: Context and Introduction
by Professor Peter Komisarczuk , Professor Keith M. Martin , Dr Jorge Blasco Alis- 4.7
Approx. 24 hours to complete
In this course you will explore information security through some introductory material and gain an appreciation of the scope and context around the subject. An introduction to knowledge areas in Information Security Professional bodies in the context of Information Security Careers in information Security A brief overview of professional bodies in the information security industry...
Cyber Security in Manufacturing
by Shambhu Upadhyaya- 4.7
Approx. 22 hours to complete
Introduction to Digital Manufacturing Security Digital Manufacturing Security Part 1 Digital Manufacturing Security - Part 2 Information Security Framework - Part 1 Information Security Framework - Part 2 Application of Information Security - Part 1 Application of Information Security - Part 2 Additional (optional) Resources: Information Security Framework, Part 1 Cyber Security in Manufacturing- Week 4 Quiz...
Security Operations and Administration
by (ISC)² Education & Training- 4.8
Approx. 16 hours to complete
Security operations and administration is the task of identifying an organization's information assets and the documentation needed for policy implementation, standards, procedures, and guidelines to ensure confidentiality, integrity, and availability. Participate in Physical Security Operations & Security Awareness Training Physical Security Operations: Physical Security Physical Security Operations: Doors Physical Security Operations: Door Locks...
Enterprise and Infrastructure Security
by Dr. Edward G. Amoroso- 4.7
Approx. 15 hours to complete
Hybrid cloud architectures are shown to provide an opportunity to fix many of the security weaknesses in modern perimeter local area networks. Security Awareness Using Video for Security Awareness Security Assessment and Audit Challenges of Compliance versus Security Video: “Addressing the Challenges of Complying with the Payment Card Industry Data Security Standard,” HALOCK Security Labs – Introduction to PCI Compliance...
Network Security
by Wenke Lee , Catherine Gamboa- 0.0
Approx. 16 weeks
lesson 1 Large-Scale Attacks DDoS Attacks Malware-Based Attacks Phishing & Fraud Underground infrastructures lesson 2 Testing and Security Assessments Penetration Testing Social Engineering and Human Factors Web Security Models & Security and Internet Protocols lesson 3 Advanced Topics Evasive and Mobile Malware Botnet detection & Cloud Security Attack-Tolerant Systems...
Free
Networks and Communications Security
by (ISC)² Education & Training- 4.7
Approx. 20 hours to complete
Welcome to Networks and Communications Security Course! In the Networks and Communications Security Course, you will learn about the network structure, data transmission methods, transport formats, and the security measures used to maintain integrity, availability, authentication, and confidentiality of the information being transmitted. Network-Based Security Devices: NAT Network-Based Security Devices: Proxies...
Security and Privacy for Big Data - Part 1
by Enrique Barra , Fabian Garcia Pastor- 4.6
Approx. 1 hour to complete
This course sensitizes regarding security in Big Data environments. By the end of the course, you will be ready to plan your next Big Data project successfully, ensuring that all security related issues are under control. Security goals Implementing security for Big Data Recognize all security related issues in big data systems and projects....