Password

Sort options

Software Security for Web Applications (Coursera)

Explore software security for web applications concepts without installing anything! This course is designed for intermediate learners, providing a solid foundation of common skills in software security. Learners will build an understanding of some of the most common software security techniques currently employed. The modules in this course cover [...]

Junos Routing, Operations, and Maintenance (Coursera)

Jun 12th 2023
Junos Routing, Operations, and Maintenance (Coursera)
Course Auditing
Categories
Effort
Languages
In this course, we will explain basic routing concepts including routing policy, routing and forwarding tables, routing instances, and Junos OS routing configuration basics. This course will also explain the concepts and configuration basics of user authentication, the various types of interfaces found on network devices, archiving configurations, configuring [...]

Security Awareness Training (Coursera)

Jun 12th 2023
Security Awareness Training (Coursera)
Free Course
Categories
Effort
Languages
The security of an organization is of the utmost importance and every member of the organization's staff plays a vital role in defending against cyber threats. One of the best ways to protect the organization is to institute a company-wide security-awareness training initiative.

Cloud Application Security (Coursera)

After completing the course, the student should be able to do the following: list and describe the OWASP Top 10 vulnerabilities; identify methods to provide cloud security assurance as part of the development life cycle, e.g. in a continuous delivery environment; list and describe the different types of virtualization [...]

Goldman Sachs Engineering Virtual program (Goldman Sachs)

Self Paced
Goldman Sachs Engineering Virtual program (Goldman Sachs)
Free Course
Categories
Effort
Languages
You are working apart of the engineering team at Goldman Sachs as a governance analyst, it is part of your duties to assess the level of protection offered by implemented controls and minimize the probability of a successful breach. To be successful at your job you often need to [...]

Digital Identities (openHPI)

The average Internet user has more than 25 Internet accounts, which are created for a wide variety of purposes. Besides accounts for e-mail services or social networks, users need access to learning platforms or online shopping services. Each of these internet accounts represents an individual digital identity. Each of [...]