Cybersecurity
Showing 1033–1044 of 1317 results
Securing Blazor Server-side Applications
Learn how to secure your Blazor Server application using a variety of best practice techniques for authentication and authorization.
Securing Cloud DevOps in PaaS, IaaS, and SaaS Settings
The usage of DevOps tools like Docker and Kubernetes has expanded. This course introduces you to securing cloud DevOps environments in PaaS, IaaS, and SaaS settings, DevOps practices, and activities across various types of cloud platforms.
Securing Connected Devices with AWS IoT Device Defender
As the number of AWS IoT devices in your environment grows, it is important to properly monitor and secure them. This course will introduce the AWS Device Defender tool to help you secure your IoT environment.
Securing Containers by Breaking in
This session explains and distinguishes the security concern of each layer in the container layers. We’ll look at OS dependencies in your images and your application dependencies.
Securing Data Analytics Pipelines on AWS
As you start preparing for your AWS certified Data Analytics Specialty exam, you need to pay close attention to the security aspect of this certification. This course will teach you how to set up access control and encryption to your data analytics pipelines.
Securing Data on AWS
This course will teach you how to encrypt your data at Amazon Web Services (AWS). Concepts include encryption and decryption, use of the Key Management Service (KMS), CloudHSM, and using Amazon Macie to manage and protect S3 storage.
Securing Data with Asymmetric Cryptography
Asymmetric cryptography is used in everything ranging from SSL and TLS certificates to credit card chips to digital document signatures. Security is more critical than ever and is one of the most important skills to have in the industry today.
Securing Docker Container Workloads
Docker containers are a mainstream mechanism for application delivery, and securing the container workload is vital. This course will give you the knowledge and techniques you need for securing containerized software applications.
Securing Express Applications
Learn how to defend against malicious attacks and improve user experiences using sessions, cookies, and password authentication.
Securing IIS Websites
In this course, you'll learn how to lock down your IIS server. You'll discover various methods of attack, how they work and how to prevent them. You'll learn how to monitor your server to prevent future attacks.
Securing Java Web Application Data
This course gives you the APIs and tools for securing user data in Java as well as the concepts needed to level up your data-security awareness.
Securing Java Web Applications
This course focuses on detection and mitigation of the input validation family of vulnerabilities, which can steal data, take control of servers, and cause havoc. You'll know how to be prepared to arm your application with the appropriate defense.