Search result for Privacy and security certification Online Courses & Certifications
Get Course Alerts by Email
The Ultimate Dark Web, Anonymity, Privacy & Security Course
by Zaid Sabih- 4.7
10.5 hours on-demand video
Learn how to access & use the dark net and the clear net privately, anonymously and securely Welcome to the ultimate dark net, privacy, anonymity and security course. This course is totally a product of Zaid Sabih & zSecurity and no other organisation is associated with it or a certification exam. Privately communicate using emails and instant messages....
$26.99
CISSP certification practice questions: Domain 1 & 2 - 2021
by Thor Pedersen | 234,000+ Enrollments Worldwide- 4.3
CISSP certification practice questions for CISSP Domain 1 and 2 - Security and Risk Mgmt & Asset Security. CISSP DOMAIN 1: Security and Risk Management (15% of the weighted questions - 160 questions) Security policies, standards, procedures and guidelines Integrate security risk considerations into acquisition strategy and practice Establish and manage information security education, training, and awareness...
$14.99
AZ-900: Microsoft Azure Fundamentals (Exam preparation)
by Phillip Burton- 0.0
5.5 hours on-demand video
Learn Microsoft Azure Fundamentals and prepare for the exam We'll examine Azure management tools, security features and network security, identity services, governance features, and privacy and compliance resources. And with some practice, you could even go for the official Microsoft certification AZ-900 - wouldn't that look good on your CV or resume?...
$12.99
Networks and Communications Security
by (ISC)² Education & Training- 4.7
Approx. 20 hours to complete
Welcome to Networks and Communications Security Course! In the Networks and Communications Security Course, you will learn about the network structure, data transmission methods, transport formats, and the security measures used to maintain integrity, availability, authentication, and confidentiality of the information being transmitted. Network-Based Security Devices: FIN, NULL, and XMAS Scanning...
Detect and Mitigate Ethical Risks
by Renée Cummings , Jennifer Fischer , Eleanor 'Nell' Watson- 0.0
Approx. 20 hours to complete
Data-driven technologies like AI, when designed with ethics in mind, benefit both the business and society at large. Manage Safety and Security Risks The Importance of Managing Safety and Security Risks Security Information and Event Management (SIEM) Incorporate Safety and Security Risk Management in the Lifecycle Managing Safety and Security Risks Quiz...
Security Operations and Administration
by (ISC)² Education & Training- 4.8
Approx. 16 hours to complete
Security operations and administration is the task of identifying an organization's information assets and the documentation needed for policy implementation, standards, procedures, and guidelines to ensure confidentiality, integrity, and availability. Document and operate security controls Understand and Comply with Code of Ethics and Security Concepts Security Operations and Administration Course Introduction...
IT Security: Defense against the digital dark arts
by Google Career CertificatesTop Instructor- 4.8
Approx. 30 hours to complete
This course covers a wide variety of IT security concepts, tools, and best practices. It introduces threats and attacks and the many ways they can show up. ● how to help others to grasp security concepts and protect themselves. Supplementary reading on HAProxy, nginx and Apache HTTP server Mobile Security and Privacy Supplemental Readings for Mobile Security and Privacy...
Related searches
Security and Privacy in TOR Network
by Edward Chow , Greg Williams , Richard White- 4.3
Approx. 22 hours to complete
In this MOOC, we will learn about TOR basic concept and see how they protect the security and privacy of users and resist censorship. We will examine how TOR realize the anonymity and utilize its service by downloading and using Tor browser software. We will also learn the best practices and operational security in providing the hidden services....
The GRC Approach to Managing Cybersecurity
by Herbert J. Mattord, Ph.D., CISM, CISSP, CDP , Michael Whitman, Ph.D., CISM, CISSP- 4.8
Approx. 10 hours to complete
This course examines the role of Governance, Risk Management, and Compliance (GRC) as part of the Cybersecurity management process, including key functions of planning, policies, and the administration of technologies to support the protection of critical information assets. US and International Security Laws and Standards Information Security and Law US and International Security Laws and Standards...
MS-900 : Microsoft 365 Fundamentals : Latest Exams 2020
by Chandrika patel- 0.0
Latest exam preparation for MS-900 Microsoft Certification (New Updated Questions 2020 ) This exam is designed for candidates looking to demonstrate foundational knowledge on the considerations and benefits of adopting cloud services in general and the Software as a Service (SaaS) cloud model. Understand security, compliance, privacy, and trust in Microsoft 365 (25-30%) Understand Microsoft 365 pricing and support (25-30%)...
$12.99