Leo A. Dregier

 

 


 

CEO / Problem Solver / PMP / Trainer at TheCodeOfLearning.com

More info here.




Customize your search:

E.g., 2016-12-08
E.g., 2016-12-08
E.g., 2016-12-08
Self Paced

Digital crime is more prevalent than ever, and the attacks are getting highly complex. Security software can’t pinpoint it—the eyes and expertise of a trained professional is necessary. Our free Computer and Hacking Forensics training teaches you how to become that professional.

Average: 7.7 (11 votes)
Self Paced

As the amount of cyber threats continue to grow, so does the Cyber Security industry. The need for capable ethical hackers is a global need. Ethical hackers are “white-hat” hackers (aka the good guys) that penetrate secured systems to highlight flaws and weaknesses in a system. They help government agencies, private businesses and public organizations identify what is secure and what needs to be fixed. If the idea of hacking as a career excites you, you’ll benefit greatly from completing Penetration Testing and Ethical Hacking training here on Cybrary.

Average: 6.2 (30 votes)
Self Paced

What is Cryptography and how does it work? In this course, you will examine how cryptography is the cornerstone of security technologies, and how through its use of different encryption methods, such as ciphers, and public or private keys, you can protect private or sensitive information from unauthorized access.

Average: 5.9 (10 votes)