Search result for User data protection Online Courses & Certifications
Get Course Alerts by Email
Professional iOS Chat App with Social Login using Firebase 3
by The Zero2Launch Team- 4.3
4 hours on-demand video
During the course, you’ll learn how to use Firebase to handle real-time data and synchronize media data such as photos and videos. Firebase has three core services: a realtime database, user authentication and hosting. Firebase offers unlimited possibilities to sync your apps data to the cloud for storing and protection....
$12.99
Python Programming - From Basics to Advanced level [2021]
by EdYoda Digital University- 4.3
8 hours on-demand video
PySpark for big data processing and many more. Artificial Intelligence or Web Development or IoT or Big Data Analysis or Cloud Application Development or Automation domain you can find n number of use cases for Python. And Python is the number one language choice for machine learning, data science, and artificial intelligence. Implement data protection and security...
$14.99
Enterprise and Infrastructure Security
by Dr. Edward G. Amoroso- 4.7
Approx. 15 hours to complete
Emerging security issues in blockchain, blinding algorithms, Internet of Things (IoT), and critical infrastructure protection are also described for learners in the context of cyber risk. Video: “Addressing the Challenges of Complying with the Payment Card Industry Data Security Standard,” HALOCK Security Labs – Introduction to PCI Compliance Blockchain, Anonymity, and Critical Infrastructure Protection...
STM32Fx Microcontroller Custom Bootloader Development
by FastBit Embedded Brain Academy- 4.5
7.5 hours on-demand video
2) Read microcontroller specific data 5) Mass erase of the user flash 6) Read and display the protection status of the flash memory...
$17.99
Microsoft Azure Architect Technologies: AZ-303/AZ-300
by ILANCHEZHIAN K- 4.2
12.5 hours on-demand video
Application Protection Services Detach Data Disk the VM Configure Enterprise Applications For Azure AD User Azure Active Directory Identity Protection Configure FTP Deployment User And Upload App Service Content...
$12.99
Cryptography
by (ISC)² Education & Training- 4.8
Approx. 14 hours to complete
Understand Requirements For Cryptography: Data Sensitivity Understand Requirements For Cryptography: Data Protection Directive Understand Requirements For Cryptography: Data Sensitivity Understand Requirements For Cryptography: Data Protection Directive...
Cloud Computing Fundamentals on Alibaba Cloud
by Steve Xue- 4.7
Approx. 12 hours to complete
RDS Attack Protection Image User Guide Secure Your Data on Alibaba Cloud Manage a Relational Database that can analyze large sets of data...
Related searches
Create a Gorgeous Photography Site with SmugMug in 90 mins
- 4.1
In this course I'm going to show you how to create a really great looking, user friendly photography website. “I have had a SM account for 2 years, taken a web design class, and I still could not filter through the potpourri of data to customize my site by myself....
Google Sheets: Complete Beginner to Advanced Training Course
by Mark Cunningham- 4.5
8 hours on-demand video
Go from being a Google Sheets beginner to an advanced user with our complete and up-to-date training course! How to combine the functions you have learned and Named Ranges to extract and manipulate large amounts of data easily Sign up today and go from a complete beginner to an advanced user in Google Sheets....
$12.99
A Guide to Security Information and Event Management - SIEM
by Sai Acuity Institute of Learning Pvt Ltd Enabling Learning Through Insight!- 3.8
16.5 hours on-demand video
You will learn that Defense in Depth (DiD) is an approach to cybersecurity in which a series of defensive mechanisms are layered in order to protect valuable data and information. You will learn that SIEM is necessary because of the rise in data breaches and to meet stringent compliance requirements You will understand Splunk's user interface -UI....
$16.99