Search result for Systems and applications security Online Courses & Certifications
Get Course Alerts by Email
Cybersecurity and Its Ten Domains
by Dr. Humayun Zafar, CEH, CISM, CRISC, PCIP- 4.3
Approx. 24 hours to complete
Introduction to Security, Access Control, and Software Development Security Introduction to Security, Access Control, and Software Development Security Quiz Information Security Governance and Risk Management & Legal, Regulations, Investigations, and Compliance Information Security Governance and Risk Management Information Security Governance and Risk Management & Legal, Regulations, Investigations, and Compliance Quiz Operations Security & Physical and Environmental Security...
Architecting with Google Kubernetes Engine: Production
by Google Cloud Training- 4.7
Approx. 12 hours to complete
Access Control and Security in Kubernetes and Google Kubernetes Engine (GKE) Kubernetes Control Plane Security Pod Security Applying pod security policies Authentication and authorization Kubernetes control plane security Access Control and Security in Kubernetes and GKE Define Identity and Access Management roles for GKE, as well as Kubernetes pods security policies...
G Suite Security
by Google Cloud Training- 4.7
Approx. 6 hours to complete
In this course you will focus on the various aspects of G Suite Security including user password policies and how to enable and enforce two step verification (2SV) for your users. - Use the security and alert centers to identify, triage, and take action on security and privacy issues in your organization....
Google Workspace Security
by Google Cloud Training- 4.7
Approx. 6 hours to complete
In this course you will focus on the various aspects of Google Workspace Security including user password policies and how to enable and enforce two step verification (2SV) for your users. - Use the security and alert centers to identify, triage, and take action on security and privacy issues in your organization....
Security and Privacy for Big Data - Part 2
by Enrique Barra , Fabian Garcia Pastor- 4.7
Approx. 1 hour to complete
This will allow you to improve your systems to a grown and sustainable level. SECURITY AND PRIVACY FOR BIG DATA - PART 2 Anonymizing and pseudonymizing data Personal data and Big Data applications Know privacy risks arising from Big Data applications and methods which reduce or prevent privacy risks of data processing activities....
Real-Time Cyber Threat Detection and Mitigation
by Dr. Edward G. Amoroso- 4.7
Approx. 15 hours to complete
This course introduces real-time cyber security techniques and methods in the context of the TCP/IP protocol suites. Explanation of some basic TCP/IP security hacks is used to introduce the need for network security solutions such as stateless and stateful firewalls. TCP/IP Evolution and Security Required: “Network Firewalls,” Steve Bellovin and Bill Cheswick...
Blockchain, Cryptoassets, and Decentralized Finance
by Don Tapscott , Alex Tapscott- 4.6
Approx. 19 hours to complete
Today, large intermediaries establish trust in our economy and control the movement, storage, and allocation of money and assets. Security Tokens, and Natural Asset & Commodity Tokens Describe seven types of cryptoassets, and explain what it means to “tokenize” an asset Explain what a smart contract is, as well as various applications of smart contracts...
Related searches
Security Best Practices in Google Cloud
by Google Cloud Training- 4.6
Approx. 13 hours to complete
This self-paced training course gives participants broad study of security controls and techniques on Google Cloud. Through recorded lectures, demonstrations, and hands-on labs, participants explore and deploy the components of a secure Google Cloud solution, including Cloud Storage access control technologies, Security Keys, Customer-Supplied Encryption Keys, API access controls, scoping, shielded VMs, encryption, and signed URLs....
MBSE: Model-Based Systems Engineering
by Ken English- 4.5
Approx. 21 hours to complete
This Model-Based Systems Engineering (MBSE) course and the Digital Thread courses featured earlier in this specialization bring together the concepts from across digital manufacturing and design, forming a vision in which the geometry of a product is just one way of describing it. Systems Engineering and the LifeCycle Applications of Model-Based Systems Engineering...
Cloud Applications
by Umakishore Ramchandran- 0.0
Approx. 4 hours to complete
This course provides an introduction to the development and support for Cloud-native applications, more specifically it delves into best practices of developing applications; migrating on premise applications to the cloud; the basic building blocks and properties expected from Cloud applications. Cloud Applications Wrap-Up Workshop 1: Azure Services and Project Discussion Infrastructure and Application Management...