Search result for Security threats and vulnerabilities Online Courses & Certifications
Get Course Alerts by Email
CompTIA Cybersecurity Analyst (CySA+) Express Bootcamp
by Joseph Holbrook (The Cloud Tech Guy)- 0.0
9.5 hours on-demand video
Ive been teaching Cloud Security Manager, Security Plus, CASP and CSA to hundreds of Dept of Defense professionals. The behavioral analytics skills covered by CSA+ identify and combat malware, and advanced persistent threats (APTs), resulting in enhanced threat visibility across a broad attack surface. Interpret the results to identify vulnerabilities, threats and risks to an organization....
$12.99
Risk Management for Cybersecurity and IT Managers
by Jason Dion • 600,000+ Enrollments Worldwide- 4.6
3 hours on-demand video
The management's guide to understanding Risk Management decisions in cybersecurity and information technology (IT)! Over the past two decades, I have worked in the cybersecurity and information technology realm, fighting for my projects to become funded. We will also cover Qualitative and Quantitative Risk Measurements, showing how you can calculate the risk of an uncertainty due to vulnerabilities and threats....
$19.99
Introduction to Security Awareness Campaigns
by Michael Goedeker- 4.4
2 hours on-demand video
Security Awareness Campaigns is about the components and reality of what makes awareness campaigns successful and which components are needed in it. This course will cover the basics of a security awareness campaign that is aimed at increasing security levels by addressing social engineering attacks and communicating the basics of awareness and threats companies face today....
$12.99
Enterprise and Infrastructure Security
by Dr. Edward G. Amoroso- 4.7
Approx. 15 hours to complete
Emerging security issues in blockchain, blinding algorithms, Internet of Things (IoT), and critical infrastructure protection are also described for learners in the context of cyber risk. Mobile security and cloud security hyper-resilience approaches are also introduced. Security Assessment and Audit Required: “Common Threats and Vulnerabilities of Critical Infrastructures,” Robles, Choi, Cho, Kim, Park, and Lee, Dongseo University, Korea....
Securing Digital Democracy
by J. Alex Halderman- 4.8
Approx. 14 hours to complete
In this course, you'll learn what every citizen should know about the security risks--and future potential — of electronic voting and Internet voting. Voting as a Security Problem Syllabus and Logistics Companion Reading and Resources Voting as a Security Problem Security Procedures and Voting Around the World Security Procedures and Voting Around the World...
Web Security: Common Vulnerabilities And Their Mitigation
by Loony Corn- 4.3
8 hours on-demand video
Coat your website with armor, protect yourself against the most common threats and vulnerabilities. Understand, with examples, how common security attacks work and how to mitigate them. Risk mitigation using the Content Security Policy Header, user input validation and sanitization, secure token validation, sandboxed iframes, secure sessions and expiry, password recovery Web security basics: Two factor authentication, Open Web Application Security Project, ...
$12.99
Cyber Security - Python and Web Applications
by Mashrur Hossain- 0.0
10.5 hours on-demand video
Learn Cyber Security, build analysis tools with Python, protect systems and web apps from vulnerabilities and more! Learn a practical skill-set in detecting and defeating online threats and become a Cyber Security Specialist - not just in theory - but in practice. Security Scanning Cloud Security We also cover the biggest threats in the information technology world today, including:...
$16.99
Related searches
Cybersecurity Compliance Framework & System Administration
by IBM Security Learning Services- 4.6
Approx. 16 hours to complete
You will learn the concepts of endpoint security and patch management. National Institute of Standards and Technology (NIST) Special Publication 800-53 Catalog of Security Controls 4 Social Engineering Threats to Keep an Eye on — and How to Stop Them Active Directory Accounts and Security Considerations Describe an overview of the design, roles and function of server and user administration....
Hacking in Practice: Intensive Ethical Hacking MEGA Course
by IT Security Academy- 4.2
21 hours on-demand video
People who make their first steps in computer / network security and professionals: network administrators, programmers, pentesters, black- and white hat hackers. Network and IT security is no joke. Security and Hacking Myths Debunked Microsoft Windows Threats and WiFi Weaknesses Current Black-Hat Threats and Trends Boost Network Security and Identify Weaknesses...
$23.99
Cyber Security in Manufacturing
by Shambhu Upadhyaya- 4.7
Approx. 22 hours to complete
Acquire knowledge about security needs and the application of information security systems. Software Security Flaws and Threats Network Security and Authentication - Part 1 Network Security and Authentication - Part 2 Additional (optional) Resources: Software Security and Secure Programming Practices Additional (optional) Resources: Network Security and Authentication, Part 1 Additional (optional) Resources: Network Security and Authentication, Part 2...