Search result for Security evaluation Online Courses & Certifications
Get Course Alerts by Email
Usable Security
by Jennifer Golbeck- 4.6
Approx. 12 hours to complete
We will look at basic principles of human-computer interaction, and apply these insights to the design of secure systems with the goal of developing security measures that respect human performance and their goals within a system. Qualitative Evaluation Week 3 - Evaluation Week 3 Quiz - Evaluation Intro to Usable Security Guidelines...
Cloudera Hadoop Administration
by Sijeesh Kunnotharamal- 0.0
4.5 hours on-demand video
Installation ,Configuration,Security,Evaluation and Upgrade of Cloudera Hadoop Cluster . Cloudera Certified Hadoop Admin This training will provide hands-on preparation for the real-world challenges faced by Hadoop Administrators. The course curriculum follows Cloudera Hadoop distribution....
$12.99
Protecting Cloud Architecture with Alibaba Cloud
by Steve Xue- 0.0
Approx. 12 hours to complete
Cloud Platform Security Overview: https://edu. Cyber Security Today Security Risk Evaluation Alibaba Cloud Security Products Overview Security Products Demo Security Center Console Overview Security Overview Host Security Security Challenge to Hosts in Cloud Host Security Management 5 Key Points Windows Security Configuration Demo Network Security Application Security Cloud Application Security Overview...
Secure Networked System with Firewall and IDS
by Edward Chow- 3.8
Approx. 9 hours to complete
This will include understanding the basic components of network security, constructing a dual-firewall DMZ, and defining security policies to implement and enforce these rules. Security Policies & Enforcement Cisco Discussion on Performance Evaluation...
CISM Information Risk Management Practice Exam
by Mind Link Technology- 0.0
Q) database management systems data security responsibility in the organization will include: d) security guarantees in accordance with the strategy. Q) security risk assessment should be repeated periodically, such as: Q) The system administrator does not immediately inform the security officer of a malicious attack. information security manager will be able to prevent this situation:...
$12.99
Human-Computer Interaction
by David Joyner- 0.0
Approx. 16 weeks
lesson 1 Principles Feedback Cycles and Direct Manipulation Design Principles and Heuristics Mental Models and Distributed Cognition lesson 2 Methods Needfinding and Requirements Gathering Low-Fidelity to High-Fidelity Prototyping Predictive Empirical and Qualitative Evaluation lesson 3 Applications Virtual and Augmented Reality and others Ubiquitous and Context-Sensitive Computing and others Healthcare Education and Security and others...
Free
Check Point SANDBLAST course
by Evgenii Puzakov- 0.0
3 hours on-demand video
Getting Evaluation license and installing it Installing Endpoint Security [Part 1] Installing Endpoint Security [Part 2]...
$12.99
Related searches
Leaders in Citizen Security and Justice Management for the Caribbean
by Olga Espinoza , Eduardo Pazinato , Alejandra Mera , Hung-En Sung- 0.0
10 Weeks
That is why the public policies of citizen security are prioritized in the agendas of the governments of the region....
$25
Investments I: Fundamentals of Performance Evaluation
by Scott Weisbenner- 4.7
Approx. 27 hours to complete
In this course, we will discuss fundamental principles of trading off risk and return, portfolio optimization, and security pricing. This course was previously entitled “Financial Evaluation and Strategy: Investments” and was part of a previous specialization entitled "Improving Business and Finances Operations", which is now closed to new learner enrollment. PREPARING for Evaluation of the Small-Value Stock Investment Strategy, 1927-2014...
Cyber Security Masterclass Course : Go From Zero to Hero
by Chinmay Kulkarni- 0.0
10.5 hours on-demand video
Once you move ahead in this course, you will get a clear idea about what cyber security is. Entire networking related to Cyber security and Terminologies - Threat, Vulnerability, Incident, Management, Attacks, Exploits, Events Careers and job opportunities in Cyber security Learn about different Cyber security organizations - NIST, NSA, SANS Institute, OWASP, CISCO...
$13.99