Recommendations by Others
With increased responsibility comes the need for new skills and ... More
The latest release of Adobe’s Creative Cloud suite ... More
This course offers a chance for individuals to mold themselves ... More
Successful teamwork is built on a foundation of trust. Each ... More
Your Search Results
Security Professional (CISSP)
The vendor-neutral CISSP certification is the ideal credential for those with proven deep technical and managerial competence, skills, experience, and credibility to design, engineer, implement, and manage their overall information security program to protect organizations from growing sophisticated attacks.
Backed by (ISC)², the globally recognized, nonprofit organization dedicated to advancing the information security field, the CISSP was the first credential in the field of information security to meet the stringent requirements of ISO/IEC Standard 17024. Not only is the CISSP an objective measure of excellence, but also a globally recognized standard of achievement.
Google Cloud Platform for AWS Professionals & GCP Security Fundamentals
AWS Professionals. This course is meant for IT professionals that are knowledgeable in AWS and are looking to get a quick ramp up in comparing Google Cloud Platform to Amazon Web Services at a functional level. This course covers most of the services. The Services covered are.
3) Data Services
Security in the cloud is much like security in your on-premise data centers, only without the costs of maintaining facilities and hardware. In the cloud, security is generally a shared responsibility between the provider and the customer. With Google Cloud Platform there are many facets of maintaining a secure cloud environment and in this course we will cover them.
Data Security and Privacy Training
Did you know the number of data records compromised in publicly disclosed data breaches surpassed 2.5 billion in 2017.
And as we all know, Facebook announced a data breach in 2018, where 87 million user accounts were compromised
Our data is being compromised more than ever. Training all employees on how to protect themselves against attacks is one of the most effective ways to protect your organization.
The objective of this training is to ensure that all your employees can clearly Identify, Mitigate and Report any potential cyber threats to your organization.
This training offers a fresh approach by presenting engaging content in a scenario-based format. This training uses micro-learning methodology to ensure learners aren’t overwhelmed with information. Throughout the course, the learner will take interactive quizzes and assessments to test their readiness. The training is available on-demand so learners can take at their own pace or part of a designated employee training program.
Who’s this for?
This compliance training is designed for all employee role types from office administration to CXO. This course will cover the following topics:
What is Information Security
What are Threats
How to Practice Information Security at Work
Email Safety and Safe Online Browsing
Implementing a Security Policy
Security+ Certification Prep
Security+ Certification Prep
The Security+ Certification Prep Course readies students for CompTIA's S+ certification exam which is globally recognized for validating foundational, vendor-neutral IT security knowledge and skills. With top experts and an interactive, lab-filled enviornment, students gain essential knowledge of the principals for network security and risk management with competency in organizational security, system security, access control and network infrastructure. The S+ certification by CompTIA is an internationally recognized credential ensuring ground-level security proficiency as well as skills for organization and security professionals to provide information, infrastructure, application and operational security. This course prepares the student for the CompTIA S+ Certification Exam SYO-401.
Certified Security Analyst Training
The Certified Security Analyst Training course prepares students for gaining practical experience with conducting realistic penetration tests. Thought by top experts in the field, students learn advanced knowledge and experience regarding the available methodologies, tools and techniques which are required to perform comprehensive information security penetration tests.
Students gain practical experience with the Licensed Penetration Tester in order to perform the intensive assessments required to effectively identify and mitigate risks to an infrastructure's security. Students not only learn to identify information security problems in this course, but also how to avoid and eliminate them with complete coverage of analysis and network security testing methods and tools.
Intro to Blockchain Technology, Blockchain Security and R3 Corda
This course will help you identify and differentiate between security threats and attacks on a Blockchain network. Blockchain security methods, best practices, risk mitigation, and all known (to date) cyber-attack vectors on the Blockchain will be covered. You will also learn how to perform a Blockchain network security risk analysis and glean a complete understanding of Blockchain's inherent security features and risks.
You will learn the key aspects around Blockchain and Bitcoin, including: What is a blockchain? What is Bitcoin? What are smart contracts? What is a cryptocurrency? What are digital tokens? How blockchain and Bitcoin are related and why it is so important to know the relationship. Some common misconceptions about blockchain and Bitcoin.
R3 Corda Blockchain is an enterprise blockchain distributed ledger. A blockchain is a tamper-evident, shared digital ledger that records transactions in a public or private peer-to-peer network. Distributed to all member nodes in the network, the ledger permanently records, in a sequential chain of cryptographic hash-linked blocks, the history of asset exchanges that take place between the peers in the network. This course has been designed for technical architects, pre sales architects, developers and project managers who must make technical decisions about distributed architectures and development platform