Search result for Security tools and techniques Online Courses & Certifications
Get Course Alerts by Email
Cyber Security in Manufacturing
by Shambhu Upadhyaya- 4.7
Approx. 22 hours to complete
Acquire knowledge about security needs and the application of information security systems. Software Security Flaws and Threats Network Security and Authentication - Part 1 Network Security and Authentication - Part 2 Intrusion Prevention Techniques and Data Leak Prevention Tools - Part 1 Intrusion Prevention Techniques and Data Leak Prevention Tools - Part 2...
Cyber Threat Intelligence
by IBM Security Learning Services- 4.7
Approx. 29 hours to complete
Finally you will recognize various scanning technologies, application security vulnerabilities and threat intelligence platforms. • Describe security vulnerability scanning technologies and tools. • Recognize application security threats and common vulnerabilities. What is Data Security and Protection Data Security and Protection Knowledge Check Application Security and Testing Application Security Techniques and Risks Knowledge Check...
AI Programming with Python
by Ortal Arel , Luis Serrano , Jennifer Staab , Juan Delgado , Grant Sanderson , Mat Leonard , Mike Yi , Juno Lee , Andrew Paster- 0.0
3 Months
You’ll learn foundational AI programming tools (Python, NumPy, PyTorch) and the essential math skills (linear Learn the essential foundations of AI: the programming tools (Python, NumPy, PyTorch), the math (calculus and linear algebra), and the key techniques of neural networks (gradient descent and backpropagation). Learn the essential foundations of AI: the programming tools, the math, and the key techniques....
Introduction to Automated Analysis
by Mike , Kevin Wendt- 4.1
Approx. 19 hours to complete
This course introduces state-of-the-art techniques for automated analysis. This course is intended for learners interested in understanding the principles of automation and the application of tools Familiarity with an object-oriented language such as Java or ability to pick-up Java syntax quickly to write and modify code, and willingness to use tools and IDEs are assumed....
Palo Alto Networks Academy Cybersecurity Foundation
by James Dalton- 4.7
Approx. 12 hours to complete
In this course, students will learn the fundamentals of cybersecurity and identify the concepts required to recognize and potentially mitigate attacks against enterprise networks as well as mission critical infrastructure. Foundation Module 2: Cyber-Landscape Careers and Common Attacks Malware - Cyberattack Techniques and Types Compliance and Security Foundation Module 7 - Cloud and Data Center Security...
G Suite Security
by Google Cloud Training- 4.7
Approx. 6 hours to complete
In this course you will focus on the various aspects of G Suite Security including user password policies and how to enable and enforce two step verification (2SV) for your users. Finally you will understand how to spot potential security risks within your organization and learn how to address them using the tools available in the admin console....
Google Workspace Security
by Google Cloud Training- 4.7
Approx. 6 hours to complete
In this course you will focus on the various aspects of Google Workspace Security including user password policies and how to enable and enforce two step verification (2SV) for your users. Finally you will understand how to spot potential security risks within your organization and learn how to address them using the tools available in the admin console....
Related searches
Introduction to Cybersecurity Tools & Cyber Attacks
by IBM Security Learning Services- 4.5
Approx. 20 hours to complete
Key terminology, basic system concepts and tools will be examined as an introduction to the Cybersecurity field. FIRST- Forum of Incident Response and Security Teams An overview of key security tools Welcome to an Introduction to Key Security Tools Key security tools Identify key cybersecurity tools which include the following:Â firewall, anti-virus, cryptography, penetration testing and digital forensics....
Security Best Practices in Google Cloud
by Google Cloud Training- 4.6
Approx. 13 hours to complete
This self-paced training course gives participants broad study of security controls and techniques on Google Cloud. Through recorded lectures, demonstrations, and hands-on labs, participants explore and deploy the components of a secure Google Cloud solution, including Cloud Storage access control technologies, Security Keys, Customer-Supplied Encryption Keys, API access controls, scoping, shielded VMs, encryption, and signed URLs....
Identifying, Monitoring, and Analyzing Risk and Incident Response and Recovery
by (ISC)² Education & Training- 4.8
Approx. 23 hours to complete
You will learn processes for collecting information, providing methods of identifying security events, assigning priority levels, taking the appropriate actions, and reporting the findings to the correct individuals. Security Assessment Activities: Participate in Security and Test Results Security Assessment Activities: Network Mapping Techniques Security Assessment Activities: Participate in Security and Test Results...