Search result for Security policies Online Courses & Certifications
Get Course Alerts by Email
Learn AWS Identity Management with AWS IAM, SSO & Federation
by Neal Davis | AWS Certified Solutions Architect & Developer Associate- 4.7
4 hours on-demand video
You'll gain in-depth knowledge of IAM Users, Groups, Roles and Policies as well as Federation Services. If you find identity security complex, you're far from alone. Identity-Based Policies and Resource-Based Policies AWS Organizations and Service Control Policies (SCPs) Overview of Users, Groups, Roles and Policies AWS Security Token Service (STS) Identity-Based Policies and Resource-Based Policies Service Control Policies (SCPs)...
$12.99
Containers & Kubernetes-Cilium N/W Policy+Spinnaker Delivery
by Indra Programmer- 2.6
6 hours on-demand video
Cilium brings API aware network security filtering&Spinnaker is an open source, multicloud continuous delivery platform. Using a new Linux kernel technology called BPF, Cilium provides a simple and efficient way to define and enforce both network-layer and application-layer security policies based on container/pod identity. Identity Based Security:Cilium visibility and security policies are based on the container orchestrator identity (e....
$12.99
Microsoft MD-100 & MD-101 - Modern Desktops Practice Tests
by Andrei Vlad- 3.1
Configure devices by using local policies • troubleshoot group policies on devices Manage Windows security • manage authentication policies Manage policies and profiles (25-30%) • migrate group policy to MDM policies • manage device compliance policies • plan device compliance policies • monitor device security • implement MAM policies • manage MAM policies...
$12.99
Network and Security Foundations
by Gerri Light , Ryan Whisler- 0.0
8 Weeks
The course also introduces basic concepts of security, covering vulnerabilities of networks and mitigation techniques, security of physical media, and security policies and procedures. The course introduces the concepts and practices associated with network security vulnerabilities, threats, risk mitigation, and the policies and procedures associated with security management. The basic security concepts associated with networks...
$299.7
The GRC Approach to Managing Cybersecurity
by Herbert J. Mattord, Ph.D., CISM, CISSP, CDP , Michael Whitman, Ph.D., CISM, CISSP- 4.8
Approx. 10 hours to complete
● Identify the key components and methodologies of Cybersecurity policies and policy development Information Security Management System Specific Security Policies Introduction to Key Security Laws US and International Security Laws and Standards Information Security and Law Introduction to Key Security Laws US and International Security Laws and Standards Identify the key components and methodologies of Cybersecurity policies and policy development...
Microsoft Intune Training (Includes Self Practice LABs)
by Pavan Kumar- 4.3
12 hours on-demand video
This feature enables people in your organization to be productive on all of their devices while keeping your organization’s information protected with the policies you create. Ensure devices and apps are compliant with company security requirements. Be sure devices and apps are compliant with your security requirements. Ensure devices and apps are compliant with company security requirements....
$15.99
Microsoft 70-411: Administering Windows Server 2012 R2
by Stone River eLearning- 0.0
14.5 hours on-demand video
Microsoft 70-411: Administering Windows Server 2012 R2 This course is specifically for participants to gain the knowledge and skills for making the appropriate job role decisions around administering Windows Server 2012 - R2. This exam will validate the administration tasks necessary to maintain a Windows Server 2012 infrastructure, such as user and group management, network access and data security....
$12.99
Related searches
CCNP,CCIE Security SCOR (350-701) Training Part-1/2
by Ahmad Ali- 4.5
34 hours on-demand video
Implementing and Operating Cisco Security Core Technologies (SCOR 350-701) with Step by Step Lab Workbook Security Concepts Content Security Compare common security vulnerabilities Compare network security solutions that provide intrusion prevention Configure and verify network infrastructure security methods Device hardening of network infrastructure security devices Implement management options for network security solutions...
$12.99
CompTIA Security+ Certification Preparation: CyberSecurity
by CyberTraining 365- 0.0
10.5 hours on-demand video
Launch yourself into an IT security career. Learn essential principles for network security and risk management. Organizational security System security In the Network Security section, students learn how to Craft a Secure Network and Apply Network Security Devices. We finish the course with comprehensive overviews of Cryptography, Business Continuity and, finally, Security Policies and Training....
$12.99
ECCouncil 712-50 CISO (CCISO) Certified Practice Exam
by Mind Link Technology- 3.7
Q) The single most important consideration to make when developing your security program, policies, and processes is: d) Establishing your authority as the Security Executive Q) An organization's Information Security Policy is of MOST importance because...
$12.99