Search result for Systems and applications security Online Courses & Certifications
Get Course Alerts by Email
Cyber-Physical Systems Security
by Raheem Beyah , David Joyner- 0.0
Approx. 16 weeks
Take this course if you need to learn the state of the art of designing protections for cyber-physical systems like the power grid, industrial control networks, and autonomous vehicles. This course provides an introduction to security issues relating to cyber-physical systems including industrial control systems and critical infrastructures....
Free
Security Operations and Administration
by (ISC)² Education & Training- 4.8
Approx. 16 hours to complete
The Security operations and Administration course addresses basic security concepts and the application of those concepts in the day to day operation and administration of enterprise computer systems and the information that they host. Security Operations: Sprinkler Systems Security Operations: Gas Suppression Systems Security Operations: Sprinkler Systems Security Operations: Gas Suppression Systems...
Network Security
by Wenke Lee , Catherine Gamboa- 0.0
Approx. 16 weeks
lesson 1 Large-Scale Attacks DDoS Attacks Malware-Based Attacks Phishing & Fraud Underground infrastructures lesson 2 Testing and Security Assessments Penetration Testing Social Engineering and Human Factors Web Security Models & Security and Internet Protocols lesson 3 Advanced Topics Evasive and Mobile Malware Botnet detection & Cloud Security Attack-Tolerant Systems...
Free
Cyber Security in Manufacturing
by Shambhu Upadhyaya- 4.7
Approx. 22 hours to complete
This course will introduce students to why creating a strong and secure infrastructure should be of paramount concern for anyone operating in the DM&D domain, and measures that can be employed to protect operational technologies, systems and resources. Acquire knowledge about security needs and the application of information security systems. Software Security Flaws and Threats...
Cyber Threats and Attack Vectors
by Greg Williams- 4.7
Approx. 12 hours to complete
From very large retailers, down to your fantasy football website, and anywhere in between, they have been compromised in some way. THREATS AND ATTACK VECTORS IN COMPUTER SECURITY Network and system based attacks Viruses and Worms Week 2 - Network and system based attacks Cloud Security Database Security Cloud Security Alliance...
Reliable Google Cloud Infrastructure: Design and Process
by Google Cloud Training- 4.7
Approx. 8 hours to complete
This course equips students to build highly reliable and efficient solutions Activity Intro: Cost estimating and planning Activity Review: Cost estimating and planning Lab Intro: Monitoring Applications in Google Cloud Lab Review: Monitoring Applications in Google Cloud Maintenance and Monitoring Define application requirements and express as KPIs, SLOs, and SLIs. Build microservice applications and architect cloud and hybrid networks....
Information Security: Context and Introduction
by Professor Peter Komisarczuk , Professor Keith M. Martin , Dr Jorge Blasco Alis- 4.7
Approx. 24 hours to complete
In this course you will explore information security through some introductory material and gain an appreciation of the scope and context around the subject. You will also gain an awareness of some of the skills, knowledge and roles/careers opportunities within the information security industry. Information and security This video introduces the core information security services and tools provided by cryptography....
Related searches
Web Connectivity and Security in Embedded Systems
by Juha Plosila , Farhoud Hosseinpour- 4.4
Approx. 12 hours to complete
Welcome to Web Connectivity and Security in Cyber Physical Systems! We will also go through security and privacy issues and challenges in cyber physical systems (CPS). You will also be able to define security requirements for your system and choose and implement a proper security and privacy technique to protect it....
Systems and Application Security
by (ISC)² Education & Training- 4.8
Approx. 17 hours to complete
Welcome to Systems and Application Security Course! In the Systems and Application Security Course, you will gain an understanding of computer code that can be described as harmful or malicious. Systems and Application Security Systems and Application Security Secure Big Data Systems & Operate and Secure Virtual Environments Operate and Secure Virtual Environments: Network Security...
Identifying, Monitoring, and Analyzing Risk and Incident Response and Recovery
by (ISC)² Education & Training- 4.8
Approx. 23 hours to complete
You will learn processes for collecting information, providing methods of identifying security events, assigning priority levels, taking the appropriate actions, and reporting the findings to the correct individuals. Describe processes for operating and maintaining monitoring systems Security Assessment Activities: Participate in Security and Test Results Security Assessment Activities: Participate in Security and Test Results...