Coursera – Managing Security in Google Cloud Platform
This self-paced training course gives participants broad study of security controls and techniques on Google Cloud Platform. Through recorded lectures, demonstrations, and hands-on labs, participants...
View ArticleCoursera – Mitigating Security Vulnerabilities on Google Cloud Platform
This self-paced training course gives participants broad study of security controls and techniques on Google Cloud Platform. Through recorded lectures, demonstrations, and hands-on labs, participants...
View ArticleA Cloud Guru AWS Security Best Practices (2020)
Some of the most commonly heard reasons for why a company can’t move to the cloud are concerns around security: “Our data is too sensitive to put in the cloud.”; “We can only trust servers that are in...
View ArticleSkillshare – Cyber Security Beginner to Expert PART 1
Have you ever wondered exactly how hackers ‘hack’? Do words like firewalls, encryption, bio-metrics and malware sound confusing to you? Have you been looking for a course that teaches you all the...
View ArticlePluralsight – Azure Security Fundamentals
Notes: Microsoft Ignite 2019 | Azure Security Fundamentals | Orin Thomas Tailwind Traders wants to improve the security of their workloads that are running in the cloud. In this session, learn how to...
View ArticlePluralsight – Including Security In The Development Testing Process CodeMash
Do you start with automation or manual tests? Should you always consider both? Can developers help? Learn some easy steps for going from manual testing to writing full automation suites. In this talk,...
View ArticleMichael B. White – The Complete Guide to Understanding Wireless Technology,...
Technology has gradually transitioned from wired to wireless over the years with tons of benefits. From the internet of things to wireless communication, we are all witnesses of the huge benefits of...
View ArticlePackt – Python for Automating Information Security
Python for Automating Information Security Learn how to use the Python programming language to automate offensive and defensive information security tasks This course includes 2.5 hours on-demand video...
View ArticleNetwork Defense.IO Osquery for Security Analysis
Improve your host-based investigation skills by learning how to use Osquery to interrogate suspicious processes, uncover persistence mechanisms, utilize enterprise-wide threat hunting techniques, and...
View ArticleCPLL – Securing the Web with Cisco Web Security Appliance (SWSA) v3.0
What you’ll learn in this course The Securing the Web with Cisco Web Security Appliance (SWSA) v3.0 course shows you how to implement, use, and maintain Cisco® Web Security Appliance (WSA), powered by...
View ArticleLynda – Implementing an Information Security Program
Building and operating an information security program at your organization can be challenging. The scope can be vast and complex. Thinking of all the ways an organization can fail and coming up with...
View ArticlePackt – Python for Automating Information Security
Learn Read and modify exploit scripts so they can be used in a real penetration test Analyze a packet capture file to look for network traffic anomalies Collect open-source intelligence (OSINT) to...
View ArticleCyber Security Source Code Defender (CSCD)
About the Cyber Security Source Code Defender Certificate: The Cyber Security Source Code Defender is a knowledge-based certificate offered by CSTT. As part of CCTT certificate program, the certificate...
View ArticleLinkedin Learning – AWS Enterprise Security Online Class
Understanding and successfully implementing security concepts is essential to using Amazon Web Services (AWS) as your enterprise solution. In this course instructor Sharif Nijim couples pragmatic...
View ArticleInfosec – AWS Essentials Security and Costs
Explore AWS cost and security with this course and prepare yourself for your certification journey. Before getting too deep into anything, it’s important to know what your limits are and what you can...
View ArticleSkillshare – Cyber Security Go From Zero to Hero
The field of technology is growing exponentially with the IT sector flourishing every day. Amidst such growth of the industry and increased concern for privacy, the demand for security is rising....
View ArticleLynda – Microsoft Azure Security Technologies AZ-500 Cert Prep 3 Manage...
Cybersecurity skills are in high demand, and the Microsoft Azure Security Technologies (AZ-500) exam is a great opportunity for IT professionals to showcase their skills to current and future...
View ArticlePearson – IT CCNP and CCIE Security Core {SCOR 350-701}
The CCNP and CCIE Security Core SCOR 350-701 Complete Video Course is designed to provide you with more than 12 hours of instruction with the goal of fully preparing you for all aspects of the exam....
View ArticlePluralsight – Cisco Data Center Core – Applying Network Compute and Storage...
Modern data centers are becoming incredibly complex and organizations must take appropriate security measures to protect data, applications, and workloads. In this course, Cisco Data Center Core:...
View ArticleMicrosoft Press Microsoft Azure Security Center
Must-have Azure Security Center insights, tips, and operational solutions for anyone working in a Microsoft Azure cloud or hybrid environment! Repack note: It came to our attention that our original...
View Article