Information Technology > > Security

Splunk Search Expert 102

Take the next step in your knowledge of Splunk. In this course, you will learn how to use time diffe...

University/Institute: Splunk Inc.

Details Take This Course

Splunk Search Expert 101

This course helps you understand the basics of machine data. You will learn about Splunk components,...

University/Institute: Splunk Inc.

Details Take This Course

Security Operations

Welcome to course 5 of 5 of this Specialization, Security Operations. This course focuses our attent...

University/Institute: (ISC)²

Details Take This Course

Securing Software, Data and End Points

Course 4: Securing Software, Data and End Points Welcome to Course Four. As we know, most attacks ag...

University/Institute: (ISC)²

Details Take This Course

Road to the CISO – Culminating Project Course

The ultimate destination for a security manager is the Chief Information Security Officer (or Chief...

University/Institute: University System of Georgia

Details Take This Course

Risk Management: Use of Access Controls to Protect Assets

Course 2: Understanding Risk Management Options and the Use of Access Controls to Protect Assets In...

University/Institute: (ISC)²

Details Take This Course

Principles of Secure Coding

This course introduces you to the principles of secure programming. It begins by discussing the phil...

University/Institute: University of California, Davis

Details Take This Course

Operating System Foundations

In this course, we take a look at what an actual operating system is. People often confuse operating...

University/Institute: Infosec

Details Take This Course

OWASP Top 10 - Risks 6-10

In this course, we will examine Vulnerable and Outdated Components, Identification and Authenticatio...

University/Institute: Infosec

Details Take This Course

Networks and Communications Security

Welcome to Networks and Communications Security Course! In the Networks and Communications Security...

University/Institute: (ISC)²

Details Take This Course

Network Security & Database Vulnerabilities

This course gives you the background needed to understand basic network security. You will learn the...

University/Institute: IBM

Details Take This Course

Network Defense Essentials (NDE)

Network Defense Essentials covers the fundamental concepts of information security and network defen...

University/Institute: EC-Council

Details Take This Course

Microsoft Azure Management Tools and Security Solutions

Microsoft Azure offers a wide range of services to deploy your applications. To keep control of your...

University/Institute: Microsoft

Details Take This Course

Maturing Risk Management

Course 8: Maturing Risk Management In management science terms, maturing a process or practice means...

University/Institute: (ISC)²

Details Take This Course

Malware Analysis and Introduction to Assembly Language

Malicious software, or malware, is typically delivered over a network and is designed to cause disru...

University/Institute: IBM

Details Take This Course

Leadership

This course is an introduction and an overview to the basic principles of cybersecurity leadership a...

University/Institute: Infosec

Details Take This Course

Introduction to Risk Management

In this course, you will learn about risk assessment techniques and how to implement a number of str...

University/Institute: University of California, Irvine

Details Take This Course

Introduction to Python for Cybersecurity

This course it the first part of the Python for Cybersecurity Specialization. Learners will get an i...

University/Institute: Infosec

Details Take This Course

Introduction to Enterprise Resiliency

Resiliency is the ability to provide the required capability in the face of adversity, without signi...

University/Institute: IBM

Details Take This Course

Introduction to Cybersecurity for Business

The world runs computers. From small to large businesses, from the CEO down to level 1 support staff...

University/Institute: University of Colorado System

Details Take This Course