Search result for Cyber security training program Online Courses & Certifications
Get Course Alerts by Email
Linux Server Security - Protect system from getting hacked!
by Packt Publishing- 0.0
8 hours on-demand video
This training program includes 3 complete courses, carefully chosen to give you the most comprehensive training possible. The second course, Practical Linux Security Solutions, covers creating and administering a secured Linux system in your work environment. By the end of the course, you'll have mastered security on Linux systems. Today he is an independent consultant and security researcher....
$12.99
Information Security Awareness-ISO 27001:2013
by infySEC Global- 4.5
1 hour on-demand video
Information Security Literate-Cyber security awareness course Hi, welcome to our Information Security Awareness course. It helps HR managers to learn how to recruit as per ISO 27001:2013 guidelines and how to run an effective employee induction program for better information security awareness. No prior training is required to take this course as we will start with the basics....
$16.99
Healthcare Data Security, Privacy, and Compliance
by Paul Nagy, PhD, FSIIM- 4.7
Approx. 6 hours to complete
In the final course of the Healthcare IT Support program, we will focus on the types of healthcare data that you need to be aware, complexities of security and privacy within healthcare, and issues related to compliance and reporting. Healthcare Data Security and Privacy Security Breaches in Healthcare...
A Complete Guide to Modern DevOps Implementation
by Packt Publishing- 4
9 hours on-demand video
Automate your infrastructure, enhance its security using DevOps tools to overcome modern challenges in software delivery Towards the end of this course, you'll implement configuration management, monitoring, and security using DevOps tools and technology framework. This training program includes 3 complete courses, carefully chosen to give you the most comprehensive training possible....
$9.99
Complete Ethical Hacking Bootcamp 2021: Zero to Mastery
by Andrei Neagoie- 4.6
27 hours on-demand video
Aleksa is a Penetration Tester with over 5 years of experience in Ethical Hacking and Cyber Security. As a self made hacker that started from a young age he has learned it all from Ethical Hacking and Cyber Security to Online Privacy and How To Become Anonymous Online. Learn how to trick people into opening your program (i....
$14.99
IT Security: Defense against the digital dark arts
by Google Career CertificatesTop Instructor- 4.8
Approx. 30 hours to complete
This course covers a wide variety of IT security concepts, tools, and best practices. ● how to help others to grasp security concepts and protect themselves. Understanding Security Threats Wireless Security Creating a Company Culture for Security Security Goals Third-Party Security Security Training Mobile Security and Privacy Interview Role Play: Security...
Detect and Mitigate Ethical Risks
by Renée Cummings , Jennifer Fischer , Eleanor 'Nell' Watson- 0.0
Approx. 20 hours to complete
Overfitting to Training Data Manage Safety and Security Risks The Importance of Managing Safety and Security Risks Cyber Attacks Evaluate Training Data and Models Protect the Security of Data in Storage Protect the Security of Data in Transit Security Information and Event Management (SIEM) Incorporate Safety and Security Risk Management in the Lifecycle...
Related searches
Pentesting with Kali Linux
by Packt Publishing- 0.0
9.5 hours on-demand video
A Hands-on guide to hacking wireless, web and network security with Kali Linux Managing security has always been a challenge for any security professional. This training program includes 2 complete courses, carefully chosen to give you the most comprehensive training possible. Prior to this course, Tajinder has authored Practical Linux Security Cookbook published by Packt Publishing....
$12.99
Microservice Development with Java EE 8: 2-in-1
by Packt Publishing- 3.9
4.5 hours on-demand video
This training program includes 2 complete courses, carefully chosen to give you the most comprehensive training possible. Next, you’ll learn about interacting data services and building web views with JSF, after which we will take a look at application security and performance....
$11.99
Identifying, Monitoring, and Analyzing Risk and Incident Response and Recovery
by (ISC)² Education & Training- 4.8
Approx. 23 hours to complete
You will learn processes for collecting information, providing methods of identifying security events, assigning priority levels, taking the appropriate actions, and reporting the findings to the correct individuals. Perform security assessment activities Perform Security Assessment Activities Security Assessment Activities: Participate in Security and Test Results Monitoring Results: Security Baseline Incident Handling: Training Incident Handling: Training...