Search result for Government cyber security requirements Online Courses & Certifications
Get Course Alerts by Email
Security: Manage Network Security With pfSense Firewall
by TetraNoodle Team- 0.0
4 hours on-demand video
According to a recent study conducted by a major Cyber Security firm, less than half the online population understands the term "Firewalls" - or know if they have one enabled on their PC. Keep in mind, outgoing traffic, with your credit card information, bank accounts, and social security number is not protected....
$14.99
CompTIA Pentest+ (Ethical Hacking) Course & Practice Exam
by Jason Dion • 600,000+ Enrollments Worldwide- 4.6
8 hours on-demand video
This certification was released on July 31, 2018 by CompTIA to fill a gap between the foundational-level CompTIA Security+ exam (for those with about 1 year in the field) and the advanced-level CompTIA Advanced Security Practitioner (for those with at least 5 years in the field)....
$14.99
Practice Your First Penetration Test: Kali & Metasploit Lab
by FeltSecure Labs- 4.6
3 hours on-demand video
Learn ethical hacking with Kali in your own lab, scan targets with Nmap and exploit victims with metasploit! Learn the popular security tools and techniques that you will need to run penetration tests with the best ethical hacking distribution Kali, and the tools: Nmap and Metasploit. Learn the Essential Techniques and Build a Strong Foundation in Penetration Testing in This Comprehensive Course From Scratch!...
$19.99
Drones and Autonomous Systems I: Fundamentals
by Irmak Renda-Tanali, D.Sc. , Brian Powers, M.A. , Barry Douglass, Ph.D.- 0.0
6 Weeks
Federal government airspace policy, regulations, and compliance including beyond-visual-line-of-sight (BVLOS) drone operations, a comparison of U. Risk factors, the ethical use of drones, and counter-UAS technologies including cyber and physical threats to UAS....
$149
Design and Analyze Secure Networked Systems
by Edward Chow- 3.8
Approx. 15 hours to complete
In this MOOC, we will learn the basic cyber security concepts, how to identify vulnerabilities/threat in a network system. We will apply CIA basic security services in the triage of recent cyberattack incidents, such as OPM data breach. Security Principles: Defense in Depth, Defense with Diversity, Cyber Resilience Assess Cybersecurity Concepts and Security Principles Learned...
The Complete Ethical Hacker Certification Exam Prep Course
by Tim Pierson- 4.3
16.5 hours on-demand video
This course offers you a clear and structured approach to getting certified; as an ethical hacker, you’ll know the ins and outs of cyber-security, overcome security vulnerabilities, and even develop your own protection solutions for networks around the globe....
$23.99
Childcare Basics - How to Find Daycare, BC Canada
by Alexandra Nestertchouk- 4.7
2 hours on-demand video
I'll give you guidance on how to assess safety and security of a childcare facility you chose, what background information to look for and where to get it. Safety, screening, education requirements Are there any course requirements or prerequisites?...
$12.99
Related searches
Detect and Mitigate Ethical Risks
by Renée Cummings , Jennifer Fischer , Eleanor 'Nell' Watson- 0.0
Approx. 20 hours to complete
Meet Compliance Requirements Manage Safety and Security Risks The Importance of Managing Safety and Security Risks Cyber Attacks Protect the Security of Data in Storage Protect the Security of Data in Transit Security Information and Event Management (SIEM) Incorporate Safety and Security Risk Management in the Lifecycle Managing Safety and Security Risks Quiz...
Digital Transformation
by Michael Lenox , Amane Dannouni , Sonja Rueger , Ching Fong Ong- 4.8
Approx. 14 hours to complete
Course Overview & Requirements Cyber Security Part I Cyber Security Part II...
Business Transformation with Google Cloud
by Google Cloud Training- 4.7
Approx. 11 hours to complete
How can a shared security model help to ensure business success? What are today's compliance requirements and how can Google Cloud help meet them? Identify components of a security program to build into your transformation journey...