Take the next step in your knowledge of Splunk. In this course, you will learn how to use time diffe...
University/Institute: Splunk Inc.
This course helps you understand the basics of machine data. You will learn about Splunk components,...
University/Institute: Splunk Inc.
Welcome to course 5 of 5 of this Specialization, Security Operations. This course focuses our attent...
University/Institute: (ISC)²
Course 4: Securing Software, Data and End Points Welcome to Course Four. As we know, most attacks ag...
University/Institute: (ISC)²
The ultimate destination for a security manager is the Chief Information Security Officer (or Chief...
University/Institute: University System of Georgia
Course 2: Understanding Risk Management Options and the Use of Access Controls to Protect Assets In...
University/Institute: (ISC)²
This course introduces you to the principles of secure programming. It begins by discussing the phil...
University/Institute: University of California, Davis
In this course, we take a look at what an actual operating system is. People often confuse operating...
University/Institute: Infosec
In this course, we will examine Vulnerable and Outdated Components, Identification and Authenticatio...
University/Institute: Infosec
Welcome to Networks and Communications Security Course! In the Networks and Communications Security...
University/Institute: (ISC)²
This course gives you the background needed to understand basic network security. You will learn the...
University/Institute: IBM
Network Defense Essentials covers the fundamental concepts of information security and network defen...
University/Institute: EC-Council
Microsoft Azure offers a wide range of services to deploy your applications. To keep control of your...
University/Institute: Microsoft
Course 8: Maturing Risk Management In management science terms, maturing a process or practice means...
University/Institute: (ISC)²
Malicious software, or malware, is typically delivered over a network and is designed to cause disru...
University/Institute: IBM
This course is an introduction and an overview to the basic principles of cybersecurity leadership a...
University/Institute: Infosec
In this course, you will learn about risk assessment techniques and how to implement a number of str...
University/Institute: University of California, Irvine
This course it the first part of the Python for Cybersecurity Specialization. Learners will get an i...
University/Institute: Infosec
Resiliency is the ability to provide the required capability in the face of adversity, without signi...
University/Institute: IBM
The world runs computers. From small to large businesses, from the CEO down to level 1 support staff...
University/Institute: University of Colorado System