Security

Sort options

Data Privacy Fundamentals (Coursera)

This course is designed to introduce data privacy to a wide audience and help each participant see how data privacy has evolved as a compelling concern to public and private organizations as well as individuals. In this course, you will hear from legal and technical experts and practitioners who [...]

Cloud and Wireless Security (Coursera)

Course 6: Cloud and Wireless Security. Welcome to course six. This course applies to security concepts, ideas, and considerations to two major changes that we have experienced in recent years. It's regarding the way we use the data.

Maturing Risk Management (Coursera)

Oct 10th 2022
Maturing Risk Management (Coursera)
Course Auditing
Categories
Effort
Languages
Course 8: Maturing Risk Management. In management science terms, maturing a process or practice means taking positive steps over time to make it more reliable, repeatable and efficient. In practice, this means getting better every day, while showing the measurements that demonstrate improvement and suggest other opportunities to improve. [...]

Securing Software, Data and End Points (Coursera)

Oct 10th 2022
Securing Software, Data and End Points (Coursera)
Course Auditing
Categories
Effort
Languages
Welcome to Course Four. As we know, most attacks against systems involve exploiting vulnerabilities in software that powers hardware. Additionally, attackers may exploit vulnerabilities in the underlying hardware, especially when that hardware is for the protected against being stolen or accessed with unauthorized use, but their real target and [...]

Security Features and Advanced Threat Prevention (Coursera)

Oct 10th 2022
Security Features and Advanced Threat Prevention (Coursera)
Course Auditing
Categories
Effort
Languages
In this course, we will describe security services such as Intrusion Prevention System (IPS), user-based firewalls, and how they are configured. You will be introduced to Juniper’s security features, such as antivirus, antispam, content filtering, and Web filtering, along with their functionality and usage. Juniper ATP Cloud (Juniper’s cloud-based [...]

Juniper Networks Security Concepts and Initial Configuration (Coursera)

Oct 10th 2022
Juniper Networks Security Concepts and Initial Configuration (Coursera)
Course Auditing
Categories
Effort
Languages
In this course, you will be introduced to Juniper’s basic network security design concepts. You will learn about the Junos operating system (Junos OS) along with SRX Series security devices. You will learn the basics of the Junos CLI and J-Web user interfaces including initial configuration tasks and basic [...]

Security Platforms, IPsec, and Troubleshooting (Coursera)

Oct 10th 2022
Security Platforms, IPsec, and Troubleshooting (Coursera)
Course Auditing
Categories
Effort
Languages
This course will begin by examining IPsec VPNs and their functionality. You will learn how IPsec VPNs are configured, implemented, and monitored. You will then be introduced to Juniper’s highly flexible SSL VPN application—Juniper Secure Connect—examining its features, configuration, deployment, and monitoring. SRX Series troubleshooting, monitoring, and maintenance will [...]

Exam Prep: AWS Certified Solutions Architect - Associate (Coursera)

Oct 10th 2022
Exam Prep: AWS Certified Solutions Architect - Associate (Coursera)
Course Auditing
Categories
Effort
Languages
This new intermediate-level course from Amazon Web Services (AWS) is designed to help you to assess your preparedness for the AWS Certified Solutions Architect - Associate exam. You will learn how to prepare for the exam by exploring the exam’s topic areas and how they map to architecting on [...]

Keamanan IT: Pertahanan terhadap Kejahatan Digital (Coursera)

Pelatihan ini membahas berbagai macam konsep, alat, dan praktik terbaik dari keamanan IT. Di sini akan diperkenalkan ancaman dan serangan dan berbagai cara kemunculan mereka. Kami akan memberi Anda beberapa latar belakang algoritma enkripsi dan bagaimana mereka digunakan untuk melindungi data. Kemudian, kami akan membahas lebih jauh tentang “tiga [...]

Establishing Command-and-Control and Finding Credentials (Coursera)

Oct 10th 2022
Establishing Command-and-Control and Finding Credentials (Coursera)
Course Auditing
Categories
Effort
Languages
This course demonstrates the use of Python to establish command-and-control channels between a target environment and the attackers infrastructure. This course also demonstrates the use of Python to collect information on a system, including both user credentials and other sensitive data.