Search result for Security analysis Online Courses & Certifications
Get Course Alerts by Email
Software Security
by Michael Hicks- 4.6
Approx. 18 hours to complete
We will consider important software vulnerabilities and attacks that exploit them -- such as buffer overflows, SQL injection, and session hijacking -- and we will consider defenses that prevent or mitigate these attacks, including advanced testing and program analysis techniques. LOW-LEVEL SECURITY WEB SECURITY Security for the Web: Introduction Threat Modeling, or Architectural Risk Analysis...
Identifying, Monitoring, and Analyzing Risk and Incident Response and Recovery
by (ISC)² Education & Training- 4.8
Approx. 23 hours to complete
Risk Identification, Monitoring, and Analysis: In the Risk Identification, Monitoring, and Analysis session, you will learn how to identify, measure, and control losses associated with adverse events. Perform security assessment activities Risk Management Process: Quantitative Analysis Monitoring Results: Security Baseline BCP and DRP: Business Impact Analysis BCP and DRP: Business Impact Analysis...
Intro to Information Security
by Wenke Lee , Mustaque Ahamad , Catherine Gamboa- 0.0
Approx. 0
lesson 1 Foundations Security mindset Essential concepts (policy CIA etc. ) lesson 2 Software security Vulnerabilities and protections Malware Program analysis lesson 3 Practical cryptography Encryption Authentication Hashing Symmetric and asymmetric crypto lesson 4 Networks Wired and wireless networks Protocols Attacks and countermeasures lesson 5 Applications and special topics Databases Web apps Privacy and anonymity Voting Public policy...
Free
Introduction to Automated Analysis
by Mike , Kevin Wendt- 4.1
Approx. 19 hours to complete
for analysis and testing of software This knowledge would benefit several typical roles: Software Engineer, Software Engineer in Test, Test Automation Engineer, DevOps Engineer, Software Developer, Programmer, Computer Enthusiast. Introduction to Automated Analysis Introduction to Automated Analysis Automated Analysis Techniques Introduction to Automated Analysis Automated Analysis Techniques Static Analysis What is Static Analysis...
Cyber Attack Countermeasures
by Dr. Edward G. Amoroso- 4.8
Approx. 19 hours to complete
Cyber Security Safeguards Introduction: What You Will Learn from This Course on Cyber Security Video: “The Security Mirage,” Bruce Schneier, TED Talk Passwords and Analysis Hand-Held Authentication Protocol (Part 2: Analysis and Cryptanalysis) Video: RSA Cyber Security with John Stewart, 2013...
Introduction to Cyber Attacks
by Dr. Edward G. Amoroso- 4.7
Approx. 19 hours to complete
This course provides learners with a baseline understanding of common cyber security threats, vulnerabilities, and risks. Suggested: Introduction to Cyber Security (Ch. Understanding Basic Security Frameworks Introducing Security Risk Analysis Final Quiz - What level of security risk do you estimate for the following threat-asset matrix entries for the ACME Software Company:...
Palo Alto Networks Academy Cybersecurity Foundation
by James Dalton- 4.7
Approx. 12 hours to complete
Course 1 of 5 in the Palo Alto Networks Security Operating Platform Cybersecurity Specialization. Foundation Module 6 - Network Security Models Video: Network Security Models I Video: Network Security Models II Network Security Models Compliance and Security Foundation Module 7 - Cloud and Data Center Security Video: Cloud Security 1 Video: Cloud Security II...
Related searches
Advanced Cyber Security Malware Hacking Course
by Istiak Ahamed Sishir- 0.0
32 mins on-demand video
Learn Malware Analysis In Cyber Security. This course aims to point out the security essentials for any given IT organization. The course enables students to setup a secure base from scratch or review an existing security skeleton for their IT environments....
$12.99
Cybersecurity Risk Management
by Tong Sun- 0.0
8 Weeks
Learn key principles of risk analysis, risk assessment and risk mitigation for information security using both qualitative and quantitative methodologies. You will learn to identify information security related threats, vulnerability, determine the risk level, define controls and safeguards, and conduct cost-benefit analysis or business impact analysis. Information security risk management framework and methodologies...
$249
Cyber Security - Python and Web Applications
by Mashrur Hossain- 0.0
10.5 hours on-demand video
Learn Cyber Security, build analysis tools with Python, protect systems and web apps from vulnerabilities and more! Go from a beginner to advanced in this easy to follow expert course by building security analysis tools using the wildly popular Python programming language, along with analyzing web application security vulnerabilities and solutions using frameworks like Ruby on Rails and php....
$16.99