Search result for Security risks and solutions Online Courses & Certifications
Get Course Alerts by Email
Cloud Application Security
by Rick Smith- 0.0
Approx. 6 hours to complete
● List and describe the OWASP Top 10 vulnerabilities. ● Describe the application of authentication factors and federated identity solutions in cloud client and server authentication. ● Given a cloud application, explain where and how the necessary crypto keys, passwords, and other security secrets should be stored and distributed. Application Security Risks Top Ten Cloud Security Risks...
Cyber Threat Intelligence
by IBM Security Learning Services- 4.7
Approx. 29 hours to complete
You will understand data protection risks and explore mobile endpoint protection. Finally you will recognize various scanning technologies, application security vulnerabilities and threat intelligence platforms. • Describe security vulnerability scanning technologies and tools. • Recognize application security threats and common vulnerabilities. What is Data Security and Protection Application Security Techniques and Risks Knowledge Check...
Detect and Mitigate Ethical Risks
by Renée Cummings , Jennifer Fischer , Eleanor 'Nell' Watson- 0.0
Approx. 20 hours to complete
Detect and Mitigate Ethical Risks Course Introduction The Importance of Managing Fairness and Non-Discrimination Risks Managing Fairness and Non-Discrimination Risks Manage Safety and Security Risks The Importance of Managing Safety and Security Risks Security Information and Event Management (SIEM) Incorporate Safety and Security Risk Management in the Lifecycle Managing Safety and Security Risks Quiz...
Introduction to Cybersecurity for Teachers
by Mac Bowley- 0.0
3
Device Security Legal Solutions Network Security Physical Security Network Controls and Firewalls...
Free
Networking and Security Architecture with VMware NSX
by Chris McCain- 4.7
Approx. 20 hours to complete
• Summarize networking and security solution architecture with VMware NSX around these key areas: Introduction & Networking and Security Architecture with VMware NSX Networking and Security Architecture with VMware NSX Data Center Security Solutions with VMware NSX Security Solutions with VMware NSX Security Solutions Review Security Solutions Multi-site Networking and Security...
Decision Making: How to Choose the Right Problem to Solve
by Kim Plowright- 0.0
2
Build personal problem-solving skills and learn how to make an effective plan to tackle real-life problems and decisions. Finding problems and solutions Understanding and selling your solution Looking for risks...
Free
Palo Alto Networks Academy Cybersecurity Foundation
by James Dalton- 4.7
Approx. 12 hours to complete
In this course, students will learn the fundamentals of cybersecurity and identify the concepts required to recognize and potentially mitigate attacks against enterprise networks as well as mission critical infrastructure. Foundation Module 2: Cyber-Landscape Careers and Common Attacks Video: Spamming and Phishing Compliance and Security Foundation Module 7 - Cloud and Data Center Security...
Related searches
G Suite Security
by Google Cloud Training- 4.7
Approx. 6 hours to complete
In this course you will focus on the various aspects of G Suite Security including user password policies and how to enable and enforce two step verification (2SV) for your users. Finally you will understand how to spot potential security risks within your organization and learn how to address them using the tools available in the admin console....
Google Workspace Security
by Google Cloud Training- 4.7
Approx. 6 hours to complete
In this course you will focus on the various aspects of Google Workspace Security including user password policies and how to enable and enforce two step verification (2SV) for your users. Finally you will understand how to spot potential security risks within your organization and learn how to address them using the tools available in the admin console....
Information Security: Context and Introduction
by Professor Peter Komisarczuk , Professor Keith M. Martin , Dr Jorge Blasco Alis- 4.7
Approx. 24 hours to complete
In this course you will explore information security through some introductory material and gain an appreciation of the scope and context around the subject. You will also gain an awareness of some of the skills, knowledge and roles/careers opportunities within the information security industry. Information and security This video introduces the core information security services and tools provided by cryptography....