Skip to content

Showcase your skills, achievements and set goals. Build your profile today!

Search

186 courses available

Salesforce

Security, Identity, and Privacy

shield-halved-duotone-light-full Cyber Security
Learn how to protect your data and control user access in Salesforce. This is a critical skill for any admin.
View full course details Cancel

Amazon Web Services

Sensitive Data Detection with Amazon Macie

shield-halved-duotone-light-full Cyber Security
This course was developed by members of AWS Technical Field Communities (TFC), an AWS community of technical experts. The content is intended to complement our standard training curriculum and augment your AWS learning journey. We are aware some…
View full course details Cancel

IBM

System and Network Security

shield-halved-duotone-light-full Cyber Security
This credential earner has the advanced competencies to design a secure network that includes systems and security devices. The individual has the technical knowledge and practical skills to secure a host operating system, update firmware, and enhance system architectures in various contexts. The earner has practiced essential workplace skills and explored cybersecurity career pathways.
View full course details Cancel

Amazon Web Services

Threat Modeling for Builders Workshop

shield-halved-duotone-light-full Cyber Security
This workshop introduces you to some of the background of threat modeling and why to do it, as well as some of the tools and techniques for modeling systems, identifying threats, and selecting mitigations. The workshop guides you through the…
View full course details Cancel

Amazon Web Services

Understanding Amazon EBS Volume Encryption

shield-halved-duotone-light-full Cyber Security
Amazon EBS Volume Encryption is an AWS encryption service that helps you protect your data. In this introductory course, we describe how this service works in conjunction with AWS Key Management Service (Amazon KMS) and how you can begin using it…
View full course details Cancel

IBM

Vulnerability Management

shield-halved-duotone-light-full Cyber Security
This credential earner has the advanced competencies to apply appropriate controls to a vulnerability of an organization. The individual has the technical knowledge and practical skills to justify threat mitigation tactics, categorize vulnerabilities by severity, evaluate the current state of organizational security, and analyze the impact of cybersecurity threats on systems and processes. The earner has practiced essential workplace skills and explored cybersecurity career pathways.
View full course details Cancel

Viewing 181-186 of 186