Skip to content

Showcase your skills, achievements and set goals. Build your profile today!

Search

186 courses available

Amazon Web Services

Getting Started with AWS Cloud Essentials

shield-halved-duotone-light-full Cyber Security
This course introduces you to cloud computing and the benefits of choosing AWS Cloud for your global infrastructure. Throughout this course, you will learn the key benefits of cloud computing and the core services offered by AWS Cloud. If you or…
View full course details Cancel

Amazon Web Services

Getting Started with AWS Config

shield-halved-duotone-light-full Cyber Security
AWS Config monitors and records your Amazon Web Services (AWS) resource configurations so you can automate the evaluation of recorded configurations against desired configurations. With AWS Config, you can examine detailed resource configuration…
View full course details Cancel

Amazon Web Services

Getting Started with Amazon GuardDuty

shield-halved-duotone-light-full Cyber Security
Amazon GuardDuty provides visibility into security threats to help you identify and remediate anomalous or suspicious activities. This course will provide you with a fundamental understanding of the purpose, benefits, architecture, pricing…
View full course details Cancel

Amazon Web Services

Getting Started with Amazon Location Service

shield-halved-duotone-light-full Cyber Security
You can use Amazon Location Service to add location data to applications using maps, places, trackers, and geofences without compromising data security. In this course, you will learn the benefits, typical use cases, and technical concepts of…
View full course details Cancel

IBM

Getting Started with Cybersecurity

shield-halved-duotone-light-full Cyber Security
This credential earner demonstrates a foundational understanding of cybersecurity key elements and the threats it addresses, including concepts of data privacy, and how to evaluate data security using the CIA triad model. The earner is aware of the job outlook in cybersecurity and is familiar with the skills required for success in various roles. The individual understands how a cybersecurity tool works.
View full course details Cancel

IBM

Getting Started with Threat Intelligence and Hunting

shield-halved-duotone-light-full Cyber Security
This badge earner has completed all the learning activities included in this online learning experience, including hands-on experience, concepts, methods and tools related to the threat intelligence and hunting domain. The individual has demonstrated domain knowledge and understanding in adopting practices, methods and tools that relates to the activities performed in cyber threat hunting.
View full course details Cancel

IBM

IBM SkillsBuild Cybersecurity Certificate

shield-halved-duotone-light-full Cyber Security
This certificate earner has advanced technical skills in cybersecurity, such as security posture evaluation, vulnerability assessment, network architecture, cloud infrastructure security, security operations, and incident reporting. Through completion of a comprehensive curriculum, application-based assessments, and authentic experiential learning, the earner has developed workplace and career management skills and industry knowledge, and is prepared for a cybersecurity career across industries.
View full course details Cancel

IBM

IT Security and Compliance

shield-halved-duotone-light-full Cyber Security
This credential earner has the advanced skills to implement, monitor, and troubleshoot security measures to ensure the protection of sensitive information and compliance with relevant policies and regulations. The individual has the technical knowledge and practical skills to secure hardware and software, implement technical controls, manage data, respond to security incidents, implement disaster recovery plans, and troubleshoot issues. The earner has practiced essential workplace skills.
View full course details Cancel

IBM

Implement Zero Trust Security

shield-halved-duotone-light-full Cyber Security
This credential earner has the advanced competencies to implement a zero trust security architecture based on insights gathered from a simulated stakeholder interview. The earner has knowledge of modeling a zero trust framework and the practical strategies to enhance organizational security. The earner has developed transferable employability skills and gained real industry experience in a project-based learning opportunity.
View full course details Cancel

Amazon Web Services

Implementing SaaS Tenant Isolation with ABAC and AWS IAM

shield-halved-duotone-light-full Cyber Security
This course was developed by members of AWS Technical Field Communities (TFC), an AWS community of technical experts. The content is intended to complement our standard training curriculum and augment your learning journey. This course teaches you…
View full course details Cancel

Amazon Web Services

In-memory Databases Learning Plan

shield-halved-duotone-light-full Cyber Security
A Learning Plan pulls together training content for a particular role or solution, and organizes those assets from foundational to advanced. Use Learning Plans as a starting point to discover training that matters to you. This Learning Plan covers…
View full course details Cancel

Amazon Web Services

In-memory Databases Learning Plan (includes labs)

shield-halved-duotone-light-full Cyber Security
A Learning Plan pulls together training content for a particular role or solution, and organizes those assets from foundational to advanced. Use Learning Plans as a starting point to discover training that matters to you. This Learning Plan covers…
View full course details Cancel

Viewing 121-132 of 186