Back to Courses

Information Technology Courses - Page 72

Showing results 711-720 of 1471
Configuration Management and the Cloud
In this course, you’ll learn how to apply automation to manage fleets of computers. You’ll understand how to automate the process for deploying new computers, keeping those machines updated, managing large-scale changes, and a lot more. We'll discuss managing both physical machines running in our offices and virtual machines running in the Cloud. We'll start by looking into an automation technique called configuration management, which lets you manage the configuration of our computers at scale. Specifically, you'll learn how to use Puppet, the current industry standard for configuration management. We'll look at some simple examples, and then see how we can apply the same concepts to more complex cases. You’ll be a Puppet-master in no time! Later on, you'll expand your automation skills by understanding how to use the Cloud to help scale your infrastructure. You'll check out some best practices for handling hundreds of virtual machines running in the Cloud and troubleshooting them when things don't go according to plan.
Learning SAS: Creating Formats and Labels
In this 1.03-hour long project-based course, you will learn to add LABELS to variables, use FORMATS to enhance outputs, regroup values using FORMATS, discover more on FORMAT RANGES and store your FORMATS in a FORMAT LIBRARY. Note: This course works best for learners who are based in the North America region. We’re currently working on providing the same experience in other regions.
Security Operations and Administration
Security operations and administration is the task of identifying an organization's information assets and the documentation needed for policy implementation, standards, procedures, and guidelines to ensure confidentiality, integrity, and availability. You will understand the process necessary for working with management and information owners, custodians, and users so that proper data classifications are defined. This will ensure the proper handling of all hard copy and electronic information. The Security operations and Administration course addresses basic security concepts and the application of those concepts in the day to day operation and administration of enterprise computer systems and the information that they host.Ethical considerations in general, and the (ISC)2 Code of Ethics in particular, provide the backdrop for any discussion of information security and SSCP candidates will be tested on both. Information security professionals often find themselves in positions of trust and must be beyond reproach in every way.Several core principles of information security stand above all others and this domain covers these principles in some depth. It can be said that the CIA triad of confidentiality, integrity and availability forms the basis for almost everything that we do in information security and the SSCP candidate must not only fully understand these principles but be able to apply them in all situations. additional security concepts covered in this domain include privacy, least privilege, non-repudiation and the separation of duties. Course Objectives 1. Define Code of Ethics 2. Describe the security concepts 3. Document and operate security controls 4. Describe the asset management process 5. Implement compliance controls 6. Assess compliance controls 7. Describe the change management process 8. Contribute to the security awareness training program 9. Contribute to physical security operations
NIST 800-171
NIST SP 800-171 is a cybersecurity framework of 110 controls in 14 families published by the National Institute of Standards and Technology (NIST). This learning path will teach you how to comply with the requirements of NIST 800-171. You will understand what CUI is and how to identify it; what a nonfederal information systems is; how to understand each of the 110 requirements in the framework and satisfy each of them if necessary; how to create a Body of Evidence (BOE) including Organizational Policy or Procedures; a System Security Plan (SSP) and Plans of Action and Milestones (POAM). Upon completion of this course, you will have the knowledge and skills to implement the controls required by the NIST 800-171 framework and build your BOE.
AWS AutoGluon for Machine Learning Classification
Hello everyone and welcome to this new hands-on project on ML classification with AWS AutoGluon. In this project, we will train several machine learning classifiers to detect and classify disease using a super powerful library known as AutoGluon. AutoGluon is the library behind Amazon Web Services (AWS) autopilot and it allows for quick prototyping of several powerful models using a few lines of code.
Deploying a Fault-Tolerant Microsoft Active Directory Environment
This is a self-paced lab that takes place in the Google Cloud console. In this Qwiklab, you set up a redundant pair of Windows Domain Controllers (DC) with AD using a new Virtual Private Cloud (VPC) network and multiple subnets on Google Cloud Platform (GCP).
Detecting and Mitigating Cyber Threats and Attacks
Computer attacks and data breaches are inevitable. It seems like every day a data breach occurs and the victims of the data breach suffer. Their information is stolen or posted online. The company’s or businesses who had the breach go on, learn a little from the attack, and just give credit monitoring out as if nothing happened. What if you could help prevent a data breach in your organization? This is the third course in the Practical Computer Security specialization. This course looks at detection and mitigation of threats and attack vectors and discusses how to use tools and principles to protect information. By the end of the course you should be able to make suggestions on what type of detection and mitigation strategy is right for your systems or business given the known threats and attack vectors. You should be able to discuss what features you want in a firewall, or how cash registers or sensitive data systems should be secured. The project at the end of the course will allow you to apply what you have learned to argue what type of detection and mitigation strategies should have been employed by companies and businesses that have suffered a data breach.
Modularizing LookML Code with Extends
This is a Google Cloud Self-Paced Lab. In this lab, you will learn how to modularize LookML code with Extends.
Working with Relational Data Stores in Azure
In this project you will create and manage instances of Azure SQL Database and Azure Synapse Analytics services. You will configure Azure SQL Server and Database level firewall, connect to the instance, and query the sample database. After completing SQL Database tasks, you will create Azure Synapse Analytics workspace with serverless and dedicated instances to import, aggregate, and export data. By completing this project, you will understand the differences between both services and how they compare to on-premises solutions.
Prisma Cloud: Securing GKE Run Time
This is a self-paced lab that takes place in the Google Cloud console. This is Part 1 in the Prisma Cloud Compute Lab Series. You will use Prisma Cloud Compute from Palo Alto Networks to secure runtime aspects of a Google Kubernetes Engine (GKE) cluster.