Search result for Security policies Online Courses & Certifications
Get Course Alerts by Email
Agriculture, Economics and Nature
by Professor David Pannell, BSc(Agric), BEc, PhD- 4.7
Approx. 17 hours to complete
Video - Food security Optional Reading - The State of Food Security and Nutrition in the World Government policies in agriculture Video - Government policies in agriculture Video - Policies to support agricultural production Video - Policies for environmental protection in agriculture Government policies in agriculture...
Taming Google Workspace - A Complete Administrator's Guide
by Paul Ogier- 0.0
11.5 hours on-demand video
You will also be able to monitor security events and risks and put in place the necessary measures to protect your users and organizational data. DNS Records, MX Records, SPF Records, DKIM Records and DMARC Policies How to secure Gmail, the Google Calendar, Drive and Docs and other security policies....
$17.99
AZ-104 Azure Administrator Associate - Complete Preparation
by Cristian Calinescu- 0.0
18.5 hours on-demand video
Configure virtual networks including planning, IP addressing, Azure DNS, and network security groups Implement Azure policies...
$19.99
AZ-104: Microsoft Azure Administrator - Full Course
by Anand Rao Nednur- 4.3
17.5 hours on-demand video
Configure virtual networks including planning, IP addressing, Azure DNS, Network Security Groups, and Azure Firewall....
$15.99
All You Need to Know About ServiceNow Administration
by Revanth Sodavaram Muni- 4.1
10.5 hours on-demand video
Create Security rules (ACL) to restrict user access...
$12.99
Anti-Money Laundering Concepts: AML, KYC and Compliance
by GenMan Solutions- 4.4
1 hour on-demand video
In the next lectures, we will cover the Anti-Money Laundering policies along with KYC procedures, Economic Sanctions & Politically exposed persons. Very helpful in the interest of security of the state....
$17.99
Ethical Hacking: Network Scan Nmap&Nessus | ethical hacking
by Muharrem AYDIN- 4.3
4.5 hours on-demand video
Become expert in Cyber Security | ethical hacking This unique security opportunity makes the skills of an ethical hacker desirable for organizations that want to ensure their systems are well-defended against cybercriminals. While Linux is considered more secure than many other systems, some hackers can modify existing Linux security distributions to use them as hacking software....
$23.99
Related searches
IBM Lotus Domino Administration 8.5.3 Training
by Kiran Kumar- 0.0
8.5 hours on-demand video
Administration Preferences Topic E: Introduction to Policies Policies Policy Documents Settings Documents Lesson 3: Examining IBM Lotus Notes and IBM Lotus Domino Security Topic A: Identifying IBM Lotus Domino Security Components Access Control List Levels Topic 3F: Determining Workstation Security Levels Lotus Domino Standard Services Lotus Domino Internet Security Mechanisms Topic B: Implementing IBM Lotus Domino Scalability Features...
$12.99
Training Exam AZ-303 Microsoft Azure Architect Technologies
by Pavan Kumar- 0.0
36 hours on-demand video
Monitor security and Monitor performance Implement Network Security Groups and Application Security Groups Manage security for applications Implement Workloads and Security Implement management and security solutions (25-30%) Monitor security and Monitor performance Implement and manage hybrid identities Implement Management and Security Solutions Implement load balancing and network security Manage security for applications...
$12.99
Microsoft Azure: Cloud Computing Made Easy: 3-in-1
by Packt Publishing- 4.5
20.5 hours on-demand video
You will then dive into Subscription and Resource Management in Azure, and learn to work with various resource groups and policies through the Azure Portal. Next, you will learn Azure Networking, set up your virtual networks, control network traffic with the help of Azure Traffic Manager and Security Groups, and host your domain name server with Azure DNS....
$17.99