Search result for Security policies Online Courses & Certifications
Get Course Alerts by Email
1Z0-1072-20, 1Z0-997-20, 1Z0-1067-20 | OCI 2020
by Test Prep Expert- 0.0
The abilities validated by this certification include: Plan and design solutions; implement and operate solutions; Design, implement and operate databases; Design for hybrid cloud architecture; Migrate on-premises workloads to OCI; Design for Security and Compliance Up-to-date training and field experience are recommended....
$12.99
Citrix Xenapp, Xendesktop7.15 administration, PVS and Wem
by Fabrice Chrzanowski- 0.0
17.5 hours on-demand video
This workshop will teach you how to deploy and distribute applications and desktops (MCS and PVS), install and configure StoreFront and Citrix Receiver, configure profile management, configure policies, print, and basic security features. configure policies...
$19.99
Bats, Ducks, and Pandemics: An Introduction to One Health Policy
by Laura Kahn- 4.7
Approx. 11 hours to complete
It can be used to analyze government policies to determine if they are effective in improving health and well-being. Human Nutrition, Basic Microbiology, Food Safety, Food Security Food Security...
Architecting with Google Kubernetes Engine: Production
by Google Cloud Training- 4.7
Approx. 12 hours to complete
Access Control and Security in Kubernetes and Google Kubernetes Engine (GKE) Kubernetes Control Plane Security Pod Security Applying pod security policies Kubernetes control plane security Pod Security Access Control and Security in Kubernetes and GKE Define Identity and Access Management roles for GKE, as well as Kubernetes pods security policies...
VMware vSphere 7: Managing and Configure vSphere Networking
by Ali Mansouri- 5
4.5 hours on-demand video
Describe vDS Security Policies and Settings Configure dvPort Group Blocking Policies...
$12.99
Palo Alto Networks Cybersecurity Essentials I
by James Dalton- 4.7
Approx. 18 hours to complete
Essentials I provides the student with a partial understanding of the fundamental tenants of cybersecurity and covers the general security concepts involved in maintaining a secure network computing environment. Reading: Security Models Essentials I: Module 3 - Security Operating Platform / Firewall Technology Video: Data Center Security with PaloAlto Networks Firewall...
ACCA F1 (AB) External Analysis Chapter 6 to 9
by CA Bhupesh Anand- 3.8
13.5 hours on-demand video
Government Policies Data Protection & Security...
$9.99
Related searches
Become a Certified Ethical Hacker (CEH)
by Ric Messier- 4.3
6.5 hours on-demand video
To that end, you will need to understand remediations, like good software development practices, remediating web application vulnerabilities as well as policies and standards that should govern all information security practices within an organization....
$23.99
Windows Server 2019: Active Directory, GPO, R. Server Access
by Denilson Bonatti- 4.6
6 hours on-demand video
Create and manage group policies (GPO) of station users to restrict certain actions that may pose potential security risks, such as blocking access to the task manager, restricting access to certain folders, disabling the download of executable files. Create and edit Group Policies (GPO) Create and edit security policies through Active Directory and Group Policies...
$18.99
Information Security - Introduction to Information Security
by Aspen Olmsted , Justin Cappos- 0.0
5 Weeks
Learn the fundamentals of information security, including Security Design Principles, Threat Modeling and Security Policy. This is a self-paced course that provides an introduction to information security and cybersecurity. Among the topics covered are Security Design Principles, Threat Modeling, and Security Policy. Articulate different security mechanisms. Describe How to Design Security Apply multilevel security policies...
$166