Cybersecurity
Showing 1129–1140 of 1317 results
Security Operations: Operations Management for CISSP®
The security manager must ensure that all security operations operate effectively. This course will teach you Security operations management skills needed for the Certified Information Systems Security Professional examination.
Security Orchestration, Automation and Response (SOAR): The Big Picture
This course will take you through the next big thing in Security Operations – SOAR. It will guide you in your journey to evaluate and implement a SOAR platform.
Security Policies and Procedures for Cisco CyberOps Associate
Cybersecurity concepts are fundamental pieces of knowledge necessary to have a career in the industry. This course details the standards and process around incident response as well as other cyber management concepts to help secure your networks.
Security Principles for CC℠
This course will teach you security concepts of information protection and assurance needed for the Certified in Cybersecurity Exam.
Security Principles for DevSecOps
Uncover DevSecOps security principles. Explore the evolution of computer systems and the Internet, InfoSec tenets, types, and risks. Learn the benefits of implementing DevSecOps.
Security Program Management and Oversight for CompTIA Security+
This course will teach you the essential foundations of effective security governance concepts along with the reasons why they’re important, both for real world implementation and the Security+ exam.
Security Task Automation with Python
This course will teach you how you can leverage Python programming language to automate repetitive security tasks.
Security Testing Basics
All the basics that are required for Beginners to get started with Security Testing are covered in this course
Security Testing Basics (Getting started for Beginners)
All the basics that are required for Beginners to get started with Security Testing are covered in this course
Selecting the Right Tool(s) for Your Red Team Operation
In this course, you’ll learn from Cyber-Security experts Dale Meredith and Aaron Rosenmund as they discuss the importance of choosing the right tool for your red team engagements, as well as their own favorite tools that they recommend to not only recon a target but obtaining access.
Selection and Approval of Security and Privacy Controls for CGRC
Risk is managed through controls and this course will teach you how to select the controls required to protect an Information System as needed for the Certified in Governance, Risk and Compliance examination.
Serverless Authentication and Authorization with Amazon Cognito
This course will teach you to leverage Amazon Cognito to configure both of these for a serverless application on AWS.