Search result for Cyber security training classes Online Courses & Certifications
Get Course Alerts by Email
Cryptography is more fun with R!
by Vladimir Zhbanko- 0.0
1.5 hours on-demand video
All methods are provided for training purposes. Course developed by non security expert by explaining the practical use of OpenSSL software library in R Statistical Language....
$12.99
Getting Started with Cloud Computing - Level 1
by Idan Gabrieli- 4.4
2.5 hours on-demand video
Basic Skills for Everyone – cloud computing and cloud services is touching almost every corner around us, whether you are a software developer, IT professional, system administrator, IT manager, solution architect, project manager, marketing manager, product manager, sales engineer, security expert, network expert, students entering the IT world and so on....
$17.99
The Complete C# Developers: Code the Right Way
by EDU CBA- 4.4
24 hours on-demand video
Why learn C# Training Course? C# Course: C# Training has become an industry standard Developers with basic familiarity with JavaScript and typed languages such as Visual Basic will find C# training easy to learn. C# training offers features which are not supported by Visual Basic including operator overloading, unsigned integers, and stronger type safety....
$12.99
Complete Asterisk Training
by Flavio E. Goncalves- 4.3
8.5 hours on-demand video
This training will teach you how to install Asterisk in an Ubuntu Server, build a complete, fully functional PBX with basic and advanced features. This training covers some of the most recent developments of Asterisk such as the version 15 and chan_pjsip. By the end of this training you will be able to:...
$13.99
C++17: From Zero to Programmer: 2-in-1
by Packt Publishing- 3.7
6.5 hours on-demand video
This training program includes 2 complete courses, carefully chosen to give you the most comprehensive training possible. You can reach him for any C++, Java, Qt, QML, TDD, BDD, and DevOps-related training or consulting assignments....
$12.99
IT Security Fundamentals: CompTIA Security+ 2015
by LearnSmart LLC- 0.0
24.5 hours on-demand video
Welcome to IT Security Fundamentals: CompTIA Security+ 2015 from LearnSmart. Section 28: What kind of security measures do you take to protect your facilities, equipment, resources, personnel, and property from damage caused by unauthorized access? Security is very important to any organization and physical security is no exception. While monitoring, it looks for suspicious activities and security policy violations....
$199.99
AWS Certified Cloud Practitioner - Complete NEW Course 2021
by Neal Davis | AWS Certified Solutions Architect & Developer- 4.7
12 hours on-demand video
Domain 2: Security and Compliance Amazon S3 Storage Classes Security Groups and Network ACLs AWS Cloud Security and Identity Security Management and Support - AWS Security Hub, Security Bulletins, Abuse Team Hi, my name is Neal Davis - I'll be your instructor for this ultimate exam training for the AWS Cloud Practitioner....
$16.99
Hacking Web Applications and Penetration Testing: Fast Start
by Muharrem AYDIN- 4.2
4 hours on-demand video
Ethical hacking involves a hacker agreeing with an organization or individual who authorizes the hacker to levy cyber attacks on a system or network to expose potential vulnerabilities. This unique security opportunity makes the skills of an ethical hacker desirable for organizations that want to ensure their systems are well-defended against cybercriminals....
$15.99
Oracle Apps R12 Financials Course Online Training
by Koduru Sridevi- 0.0
23 hours on-demand video
Oracle Financials Online Training Videos | Oracle EBS Financials Training with Live Meeting Support Oracle Apps R12 Financials Course Online Training Videos with Live Meeting Support to clear your queries on every Sunday....
$44.99
Network Security & Database Vulnerabilities
by IBM Security Learning Services- 4.6
Approx. 14 hours to complete
You will learn how networking affects security systems within an organization. You will learn about various security breach types associated with databases and organizations that define standards and provide tools for cybersecurity professionals. Research of Network Vendor Training IP Address Structure and Network Classes Leveraging Security Industry Best Practices A Data Protection Solution Example, IBM Security Guardium Use Cases...