Back to Courses

Computer Security And Networks Courses - Page 15

Showing results 141-150 of 277
Identifying and Resolving Application Latency for Site Reliability Engineers
This is a self-paced lab that takes place in the Google Cloud console. In this lab, you will learn how to use the Cloud Operations Tracing and Profiler tools to diagnose and correct application latencies. Site Reliability Engineers (SRE) have a broad set of responsibilities, of which, managing incidents is a critical part of their role. In this lab, you will learn how to take advantage of the integrated capabilities of Google Cloud's operations suite to observe latency of applications deployed and set Service Level Indicators and Objectives to resolve such latencies.
Linux Cloud and DevOps
In this course, we look at Cloud, DevOps and the Linux operating system. The course material is a good for anyone preparing for the Linux Foundation Certified IT Associate (LFCA) exam or just interested in learning more about Linux. This course is the fourth course in a series that aims to prepare you for working as an information technology professional.
Security Operations and Administration
Security operations and administration is the task of identifying an organization's information assets and the documentation needed for policy implementation, standards, procedures, and guidelines to ensure confidentiality, integrity, and availability. You will understand the process necessary for working with management and information owners, custodians, and users so that proper data classifications are defined. This will ensure the proper handling of all hard copy and electronic information. The Security operations and Administration course addresses basic security concepts and the application of those concepts in the day to day operation and administration of enterprise computer systems and the information that they host.Ethical considerations in general, and the (ISC)2 Code of Ethics in particular, provide the backdrop for any discussion of information security and SSCP candidates will be tested on both. Information security professionals often find themselves in positions of trust and must be beyond reproach in every way.Several core principles of information security stand above all others and this domain covers these principles in some depth. It can be said that the CIA triad of confidentiality, integrity and availability forms the basis for almost everything that we do in information security and the SSCP candidate must not only fully understand these principles but be able to apply them in all situations. additional security concepts covered in this domain include privacy, least privilege, non-repudiation and the separation of duties. Course Objectives 1. Define Code of Ethics 2. Describe the security concepts 3. Document and operate security controls 4. Describe the asset management process 5. Implement compliance controls 6. Assess compliance controls 7. Describe the change management process 8. Contribute to the security awareness training program 9. Contribute to physical security operations
Message Encoding/Decoding in Python with GUI
In this 1-hour long project-based course, you will learn how to secure your information by encoding and decoding the messages. In this project, You’ll be able to create functions in Python that perform encoding and decoding techniques using a common key. Furthermore, You’ll be able to create a Graphical User Interface (GUI) in Python using Tkinter library. Note: This course works best for learners who are based in the North America region. We’re currently working on providing the same experience in other regions.
Detecting and Mitigating Cyber Threats and Attacks
Computer attacks and data breaches are inevitable. It seems like every day a data breach occurs and the victims of the data breach suffer. Their information is stolen or posted online. The company’s or businesses who had the breach go on, learn a little from the attack, and just give credit monitoring out as if nothing happened. What if you could help prevent a data breach in your organization? This is the third course in the Practical Computer Security specialization. This course looks at detection and mitigation of threats and attack vectors and discusses how to use tools and principles to protect information. By the end of the course you should be able to make suggestions on what type of detection and mitigation strategy is right for your systems or business given the known threats and attack vectors. You should be able to discuss what features you want in a firewall, or how cash registers or sensitive data systems should be secured. The project at the end of the course will allow you to apply what you have learned to argue what type of detection and mitigation strategies should have been employed by companies and businesses that have suffered a data breach.
Cybersecurity Policy Foundations
In this course, the learner will get a good look at what policies and frameworks do to keep the cybersecurity industry on-mission and formal. Without this area of cybersecurity, cybersecurity would mean too many people doing too many different things that might not even improve security. Learn how you can have a successful career in cybersecurity without ever touching a command line!
Deploy Your Website on Cloud Run
This is a self-paced lab that takes place in the Google Cloud console. In this lab you will deploy a website to Google Kubernetes Engine, scale it out to more instances, then deploy a new version using rolling updates.
Blockchain Basics
This first course of the Blockchain specialization provides a broad overview of the essential concepts of blockchain technology – by initially exploring the Bitcoin protocol followed by the Ethereum protocol – to lay the foundation necessary for developing applications and programming. You will be equipped with the knowledge needed to create nodes on your personal Ethereum blockchain, create accounts, unlock accounts, mine, transact, transfer Ethers, and check balances. You will learn about the decentralized peer-to-peer network, an immutable distributed ledger and the trust model that defines a blockchain. This course enables you to explain basic components of a blockchain (transaction, block, block header, and the chain) its operations (verification, validation, and consensus model) underlying algorithms, and essentials of trust (hard fork and soft fork). Content includes the hashing and cryptography foundations indispensable to blockchain programming, which is the focus of two subsequent specialization courses, Smart Contracts and Decentralized Applications (Dapps). You will work on a virtual machine image, specifically created for this course, to build an Ethereum test chain and operate on the chain. This hands-on activity will help you understand the workings of a blockchain, its transactions, blocks and mining. Main concepts are delivered through videos, demos and hands-on exercises.
Write your own Python tool to footprint a web application
In this 1-hour long project-based course, you will learn how to Learn basic functioning of a web application, Set up your private web Pentesting lab, Learn how to write python script to automatically footprint a web application.
Build a Website Map with Jumpchart
There are many tools to develop websites. Planning a website is an important step in the process. Without planning your site you may not meet all the user’s pain points and your user design will be flawed. Jumpchart lets you draft and export websites from your browser, then share your creations with others to collaborate. Drafts can be turned into wireframes, and Jumpchart takes your links, images, and files to produce your website. The sitemaps in Jumpchart will be built as you add pages to your website plan. In this project you will learn about how to use Jumpchart and create your website design.