186 courses available
Cisco Networking Academy
Introduction to Cybersecurity
Cyber SecurityThis course is the first in the six-course Junior Cybersecurity Analyst Pathway, aligned to the CCST (Cisco Certified Support Technician) Cybersecurity certification. This introductory course takes you inside the world of cybersecurity. You will learn cybersecurity basics to protect your personal digital life and gain insights into the biggest security challenges companies, governments, and educational institutions face today. Cybersecurity professionals who can protect and defend an organization’s network are in high demand.
Amazon Web Services
Introduction to Esri on AWS
Cyber SecurityThis course was developed by members of AWS Technical Field Communities (TFC), an AWS community of technical experts. The content is intended to complement our standard training curriculum and augment your AWS learning journey. We are aware some…
Cisco Networking Academy
Network Defense
Cyber SecurityThis course is the fifth in the six-course Junior Cybersecurity Analyst Pathway, aligned to the CCST (Cisco Certified Support Technician) Cybersecurity certification. This course covers ways to monitor your network and how to evaluate security alerts. Delve into the tools and techniques used to protect a network, including access control, firewalls, cloud security, and cryptography. These monitoring and defense tools, along with others, work together to create a layered defense-in-depth cybersecurity strategy. The knowledge and skills that you learn will help you defend networks against many types of attacks and quickly react to any exploits that may occur.
Cisco Networking Academy
Networking Basics
Cyber SecurityThis course is the second in the six-course Junior Cybersecurity Analyst Pathway, aligned to the CCST (Cisco Certified Support Technician) Cybersecurity certification, and the first in the four-course Network Technican Pathway, aligned to the CCST Networking certification. This course covers the foundation of networking and network devices, media, and protocols. You will observe data flowing through a network and configure devices to connect to networks. Finally, you will learn how to use different network applications and protocols to accomplish networking tasks.
Cisco Networking Academy
Networking Devices and Initial Configuration
Cyber SecurityThis course is the third in the six-course Junior Cybersecurity Analyst Pathway, aligned to the CCST (Cisco Certified Support Technician) Cybersecurity certification and the second in the four-course Network Technican Pathway, aligned to the CCST Networking certification. This course covers the essentials of network devices and how to configure them. Learn the characteristics and benefits of Cloud and Virtualization technologies. Explore how to provide Internet Protocol (IP) addresses to devices both manually and automatically. Using this knowledge, you will calculate an IP addressing scheme, configure Cisco devices to create a small network, and test for connectivity issues.
Amazon Web Services
Official Practice Question Set: AWS Certified Security - Specialty (SCS-C02 - English)
Cyber SecurityThe Official Practice Question Set: AWS Certified Security - Specialty (SCS-C02) consists of 20 questions. This question set aligns with the SCS-C02 version of the exam and exam guide. If you are looking for an assessment that is the same length…
IBM
Perform Risk Assessment and Prioritization
Cyber SecurityThis credential earner demonstrated their applied knowledge in assessing and prioritizing risks for an organization. The earner has identified security anomalies on the system, performed risk assessments, and provided recommendations based on priority risk. The earner will build and develop their transferable skills and gain real industry experience.
Amazon Web Services
Performing a Basic Audit of your AWS Environment
Cyber SecurityThis lab leads you through the steps to perform basic audits of core AWS resources. You will use the AWS Management Console to understand how to audit the use of multiple AWS services, Amazon EC2, Amazon VPC, Amazon IAM, Amazon Security Groups,…
IBM
Plan an Open-Source Intelligence Strategy
Cyber SecurityThis credential earner has the advanced competencies to identify potential vulnerabilities in an organization’s infrastructure through planning and executing open-source intelligence (OSINT) techniques. The earner has knowledge of OSINT techniques to execute penetration testing and the practical strategies to enhance organizational security. The earner has developed transferable employability skills and gained real industry experience in a project-based learning opportunity.
Amazon Web Services
Planning an AWS Outposts Implementation
Cyber SecurityIn this course, you learn about implementation planning for AWS Outposts, including security responsibilities, facilities requirements, networking requirements, and where to deploy your code. You learn how Outposts works with the AWS Region and…
Amazon Web Services
PostgreSQL Extensions
Cyber SecurityThis course was developed by members of AWS Technical Field Communities (TFC), an AWS community of technical experts. The content is intended to complement our standard training curriculum and augment your AWS learning journey. We are aware some…
Amazon Web Services
PostgreSQL Security
Cyber SecurityCloud security at Amazon Web Services (AWS) is the highest priority. AWS customers benefit from a data center and network architecture that are built to meet the requirements of the most security-sensitive organizations. This course will cover…
Viewing 145-156 of 186