Search result for Security Online Courses & Certifications
Get Course Alerts by Email
Systems and Application Security
by (ISC)² Education & Training- 4.8
Approx. 17 hours to complete
Welcome to Systems and Application Security Course! In the Systems and Application Security Course, you will gain an understanding of computer code that can be described as harmful or malicious. Describe the processes for operating endpoint device security Operate and Secure Virtual Environments: Network Security Operate and Secure Virtual Environments: Virtual Machine Security...
Palo Alto Networks Academy Cybersecurity Foundation
by James Dalton- 4.7
Approx. 12 hours to complete
Course 1 of 5 in the Palo Alto Networks Security Operating Platform Cybersecurity Specialization. Foundation Module 6 - Network Security Models Video: Network Security Models I Video: Network Security Models II Network Security Models Compliance and Security Foundation Module 7 - Cloud and Data Center Security Video: Cloud Security 1 Video: Cloud Security II...
Security Awareness Training
by (ISC)² Education & Training- 4.6
Approx. 2 hours to complete
The security of an organization is of the utmost importance and every member of the organization's staff plays a vital role in defending against cyber threats. • Networking and Mobile Security Importance of Security Importance of Security Data and Account Security Data and Account Security Networking and Mobile Security Network and Security...
Introduction to Enterprise Computing
by Jeff Bisti- 4.7
Approx. 10 hours to complete
Mainframe Security and Start-up z/OS Security Security addendum Transaction level security z/OS Security Transaction level security...
Cloud Security Basics
by Rick Smith- 4.7
Approx. 13 hours to complete
We'll learn and apply classic security techniques to today’s cloud security problems. We’ll analyze recent cloud security vulnerabilities using standard, systematic techniques. We’ll build our own web service case studies and construct security solutions for them. An overview of Cloud Security Basics Internet Service Security Security Controls: Packet Filtering Transport Layer Security...
Security & Safety Challenges in a Globalized World
by Bibi van den Berg , Ruth Prins- 4.8
Approx. 12 hours to complete
Security and safety challenges rank among the most pressing issues of modern times. This course combines scholarly inquiry from multiple disciplines (ranging from terrorism studies, to crisis management, to medical science) with real-life cases to explore and understand complex modern-day safety and security challenges. Safety and Security Van den Berg and Hutten: Security and Safety: An Introduction...
Web Connectivity and Security in Embedded Systems
by Juha Plosila , Farhoud Hosseinpour- 4.4
Approx. 12 hours to complete
Welcome to Web Connectivity and Security in Cyber Physical Systems! You will also be able to define security requirements for your system and choose and implement a proper security and privacy technique to protect it. Introduction to Web Connectivity & Security Introduction to Web Connectivity & Security (Graded Quiz) CPS Security and Privacy...
Real-Time Cyber Threat Detection and Mitigation
by Dr. Edward G. Amoroso- 4.7
Approx. 15 hours to complete
This course introduces real-time cyber security techniques and methods in the context of the TCP/IP protocol suites. Explanation of some basic TCP/IP security hacks is used to introduce the need for network security solutions such as stateless and stateful firewalls. TCP/IP Evolution and Security More Advanced Network Security Technologies Network Security Architectures...
Security Testing Nmap Security
by Sulaiman Siddiqi- 0.0
1.5 hours on-demand video
Security Testing Nmap Security...
$12.99
Securing Digital Democracy
by J. Alex Halderman- 4.8
Approx. 14 hours to complete
In this course, you'll learn what every citizen should know about the security risks--and future potential — of electronic voting and Internet voting. Voting as a Security Problem The Security Mindset Security Requirements for Voting Voting as a Security Problem Security Procedures and Voting Around the World Security Procedures and Voting Around the World...