Search result for Security testing Online Courses & Certifications
Get Course Alerts by Email
Introduction to Automated Analysis
by Mike , Kevin Wendt- 4.1
Approx. 19 hours to complete
for analysis and testing of software This knowledge would benefit several typical roles: Software Engineer, Software Engineer in Test, Test Automation Engineer, DevOps Engineer, Software Developer, Programmer, Computer Enthusiast. Parameterized Unit Testing using junit-quickcheck Automated Test Generation using Random Testing Automating Security Testing Using Fuzz Testing Automating Security Testing Using Fuzz Testing...
Securing Digital Democracy
by J. Alex Halderman- 4.8
Approx. 14 hours to complete
In this course, you'll learn what every citizen should know about the security risks--and future potential — of electronic voting and Internet voting. Voting as a Security Problem The Security Mindset Voting as a Security Problem Security Procedures and Voting Around the World Field Testing Security Procedures and Voting Around the World...
Identifying, Monitoring, and Analyzing Risk and Incident Response and Recovery
by (ISC)² Education & Training- 4.8
Approx. 23 hours to complete
Perform security assessment activities Perform Security Assessment Activities Security Assessment Activities: Participate in Security and Test Results Security Assessment Activities: Penetration Testing Security Assessment Activities: Penetration Testing Monitoring Results: Security Baseline BCP and DRP: Testing and Drills BCP and DRP: Full Interruption Testing BCP and DRP: Testing and Drills BCP and DRP: Full Interruption Testing...
Network Security - Introduction to Network Security
by Aspen Olmsted- 0.0
5 Weeks
Information Security - Introduction to Information Security Information Security - Authentication and Access Control Information Security - Advanced Topics Penetration Testing - Exploitation Penetration Testing - Post Exploitation This is a self-paced course that provides an introduction to network security topics. Describe how "social engineering" can be used to compromise security...
$166
Information Security - Introduction to Information Security
by Aspen Olmsted , Justin Cappos- 0.0
5 Weeks
Learn the fundamentals of information security, including Security Design Principles, Threat Modeling and Security Policy. Penetration Testing - Exploitation Penetration Testing - Post Exploitation This is a self-paced course that provides an introduction to information security and cybersecurity. Among the topics covered are Security Design Principles, Threat Modeling, and Security Policy....
$166
Network Security - Advanced Topics
by Aspen Olmsted- 0.0
5 Weeks
Learn advanced topics in network security, including Security Monitoring, Perimeter Security, IPv6 and IPv6 Security. Penetration Testing - Exploitation Penetration Testing - Post Exploitation This is a self-paced course that provides a continuation of network security topics. Among the topics covered are Security Monitoring, Perimeter Security, IPv6, and IPv6 Security. Define network security monitoring...
$166
Network Security - Protocols
by Aspen Olmsted- 0.0
5 Weeks
Learn more fundamentals of network security, including cryptographic algorithms used in networking protocols, TLS/SSL, IPSec Layer 2 Security and Wireless Security. Information Security - Introduction to Information Security Information Security - Authentication and Access Control Penetration Testing - Exploitation Penetration Testing - Post Exploitation This is a self-paced course that provides a continuation of network security topics....
$166
Related searches
Information Security - Advanced topics
by Aspen Olmsted- 0.0
5 Weeks
Information Security - Introduction to Information Security Information Security - Authentication and Access Control Information Security - Advanced Topics Network Security - Introduction to Network Security Network Security - Protocols Penetration Testing - Exploitation Penetration Testing - Post Exploitation This is a self-paced course that provides a continuation of information security and cybersecurity topics....
$166
Security Operations and Administration
by (ISC)² Education & Training- 4.8
Approx. 16 hours to complete
Security operations and administration is the task of identifying an organization's information assets and the documentation needed for policy implementation, standards, procedures, and guidelines to ensure confidentiality, integrity, and availability. Participate in Physical Security Operations & Security Awareness Training Physical Security Operations: Physical Security Physical Security Operations: Doors Physical Security Operations: Door Locks...
Information Security - Authentication and Access Control
by Aspen Olmsted- 0.0
6 Weeks
Information Security - Introduction to Information Security Information Security - Authentication and Access Control Information Security - Advanced Topics Penetration Testing - Exploitation Penetration Testing - Post Exploitation This is a self-paced course that provides a continuation of information security and cybersecurity topics. Describe the Security Mechanisms built into Chromium OS...
$166