Back to Courses

Security Courses - Page 5

Showing results 41-50 of 173
Governance and Strategy
This course is an introduction and an overview to the basic principles of cybersecurity Governance and Strategy. It provides guidance on determining information security objectives and how to measure progress toward achieving them. It is an exposition on the rationale and necessity for senior management to integrate information security into overall organizational governance at the highest levels.
Getting Started with Linux Terminal
In this 1-hour long project-based course, you will learn how to use simple commands to create and manipulate files and folders, perform multiple complex tasks using one simple command, use the superuser to perform high privilege operations.
NIST CSF
This course will help you to build a basic understanding of NIST cybersecurity fundamentals. You will learn about the RMF process and managing risk by identifying, assessing and responding to risk. Additionally, you will learn how to use the framework to assess an organization's cybersecurity risk and the steps to implement or improve a cybersecurity program. The Cybersecurity Framework skill path introduces the framework for improving infrastructure cybersecurity.
Check Point Jump Start: Quantum Management
"Check Point's Quantum is the best Threat Prevention solution on the Market! It offers uncompromising Security, consistently preventing both known and unknown Zero-day attacks. Check Point Quantum Network Security provides ultra-scalable protection against Gen V cyber attacks on your network, cloud, data center, IoT, and remote users. This course includes these modules: 1. Intro 2. Installing Gaia 3. Running the First Time Wizard. 4. Installing SmartConsole 5. Establish SIC 6. Create & installing Policy 7. Enable application control blade 8. Enable IDA blade 9. Enable HTTPS Inspection 10. Enable Autonomous Threat Prevention 11. Adding License 12. CPUSE SmartConsole 13. Gathering cpinfo This course is suitable for new Check Point customers with no prior experience configuring or administrating Check Point Network Security products." To learn more about Check Point Training, see: https://www.checkpoint.com/mind/ https://training-certifications.checkpoint.com/#/
Accelerating GKE Incident Response with Prisma Cloud and Cortex XSOAR
This is a self-paced lab that takes place in the Google Cloud console. Learn how to automate the response to a security incident with Prisma Cloud Compute, Cortex XSOAR, additional integrations, and a playbook.
Healthcare Data Security, Privacy, and Compliance
In the final course of the Healthcare IT Support program, we will focus on the types of healthcare data that you need to be aware, complexities of security and privacy within healthcare, and issues related to compliance and reporting. As a health IT support specialist, you’ll be exposed to different types of data sources and data elements that are utilized in healthcare. It’s important for you to understand the basic language of healthcare data and for you to recognize the sensitive nature of protected health information (PHI). Maintaining data privacy and security is everyone’s responsibility, including IT support staff! We’ll go into detail about HIPAA and the risks associated with security breaches, ransomware and phishing. We’ll go into detail about some of the key laws and regulations specific to healthcare and the importance of compliance with them. You'll leave this course well versed on the Stark Law, the Joint Commission and the purpose of quality measures. We wrap up the Healthcare IT Support certificate with tips on job interviews, skills that can make you standout, and words of advice on the endless possibilities in this dynamic and growing field. Make sure you talk to others who’ve been there before about the process of being hired at a large health system. Be rest assured that you’ll receive training when you start a new role, and you might even be partnered with someone else for the first few weeks as you get onboarded. Remember, this is not the end--rather, it’s just the beginning of the next step in your journey!
Google Kubernetes Engine Security: Binary Authorization
This is a self-paced lab that takes place in the Google Cloud console. This lab deploys a Kubernetes Engine Cluster with the Binary Authorization feature enabled; you'll learn how to whitelist approved container registries and the process of creating and running a signed container.
Authentication, Authorization, and Identity with Vault
This is a self-paced lab that takes place in the Google Cloud console. In this hands-on lab, you will learn to use authentication and authorization methods within Vault. You will also create users, aliases, entities, and groups.
Cloud Top Ten Risks
After completing the course, the student should be able to do the following: ● Associate lists of OWASP Top Ten Risks with major cloud cybersecurity risks. ● Apply appropriate cryptographic techniques to secure authentication mechanisms and cloud data. ● Identify the most effective strategies for resisting injection attacks, cross-site scripting attacks, and object deserialization attacks. ● Assess strategies to address risks posed by administrative failures, including misconfiguration, broken access control, vulnerable software components, and security monitoring.
Decentralized Finance (DeFi) Deep Dive
DeFi and the Future of Finance is a set of four courses that focus on decentralized finance. The third course is called DeFi Deep Dive. It is essential that you do the first two courses I. DeFi Infrastructure and II. DeFi Primitives before doing this course. It is the longest of the four courses and focuses on some of the leading protocols in the DeFi space. We will look at Credit and Lending (and feature MakerDAO, Compound and Aave), Decentralized Exchange with an analysis of how protocols like Uniswap and Balancer works, Derivatives (featuring Yield Protocol, dYdX and Synthetix) and Tokenization with an analysis of Set Protocol as well as wrapped bitcoin. For many of these leading protocols, we include detailed examples of how the mechanics work. For example, we show how to use a dYdX flash swap to execute an arbitrage transaction (take advantage of different prices on different exchanges for the same asset).