Search result for Threat protection Online Courses & Certifications
Get Course Alerts by Email
Mitigating Security Vulnerabilities on Google Cloud
by Google Cloud Training- 4.7
Approx. 8 hours to complete
Mitigating the Threat of Ransomware Threat Mitigation Strategies for Content...
AZ-900: Microsoft Azure Fundamentals Certification - 2021
by Anand Rao Nednur- 4.2
9.5 hours on-demand video
· describe Azure DDoS Protection · describe Azure Information Protection (AIP) · describe Azure Advanced Threat Protection (ATP) Understand privacy, compliance and data protection standards in Azure...
$17.99
Detect and Mitigate Ethical Risks
by Renée Cummings , Jennifer Fischer , Eleanor 'Nell' Watson- 0.0
Approx. 20 hours to complete
Data Protection Policies Threat Intelligence Threat Modeling Threat and Risk Libraries Threat Modeling and Analysis Tools...
Azure SQL Data Warehouse Synapse Analytics Service
by Eshant Garg | LearnCloud.Info | 100,000+ Enrollments- 4.6
7 hours on-demand video
First is Threat Protection - This is a most outer layer of security, and in this Microsoft Azure constantly monitor the traffic to your Azure SQL Database and look for suspicious patterns. And finally comes the Data Protection layer - Microsoft provides different information protection and encryption technologies to protect our data in your Azure SQL Database....
$15.99
Cryptography and Information Theory
by Sang-Yoon Chang- 4.5
Approx. 8 hours to complete
Threat Model and the Attacker Knowledge...
Industrial IoT Markets and Security
by David Sluiter- 4.7
Approx. 22 hours to complete
Segment 6 - Threat Vectors, Attacks: Man-in-the-midddle, Replay Segment 7 - Protection Methods, Side-Channel Attacks Segment 15 - Don Matthews, Attacks Part 2, Threat Model...
Introduction to TCP/IP
by Jong-Moon Chung- 4.6
Approx. 8 hours to complete
2 Growing Security & Threat Issues 4 Internet Security & Protection...
Related searches
Cultural and creative industries
by Iliya Kiria- 3.8
Approx. 22 hours to complete
Concentration as a threat to opinions’ diversity Cultural identity protection argument Cultural identity protection policies Pluralism protection and content regulation policies...
Cyber Security in Manufacturing
by Shambhu Upadhyaya- 4.7
Approx. 22 hours to complete
Intellectual Property Protection from Threats Additional (optional) Resources: Intellectual Property Protection from Threats - External and Internal...
Violence Against Healthcare
by Beat Stoll , Esperanza Martinez , Alexander Breitegger , Frederik Siem , Luigi Fratini , Bruce Eshaya-Chauvin- 4.6
Approx. 15 hours to complete
Module 2: The legal framework on the protection of health-care delivery 1 Main concerns regarding the protection of healthcare personnel and facilities - Jamie Williamson, (Head of Unit, Relations with Arms Carriers, ICRC) Building Community resilience - Marta Pawlak, (Advisor on Community Based Protection & Sexual Violence, ICRC)...