Skip to content

Showcase your skills, achievements and set goals. Build your profile today!

Search

186 courses available

Amazon Web Services

Amazon EKS Security

shield-halved-duotone-light-full Cyber Security
In this course, you learn how to add security to your Amazon EKS cluster and which tools and services you can use to protect your clusters. You learn about key Amazon EKS security topics such as securing your images, understanding and restricting…
View full course details Cancel

Amazon Web Services

Amazon Elastic File System (Amazon EFS) Primer

shield-halved-duotone-light-full Cyber Security
Amazon Elastic File System (Amazon EFS) provides a practical, serverless, set-and-forget elastic file system for use with Amazon Web Services (AWS) Cloud services and on-premises resources. It is built to scale on demand to petabytes without…
View full course details Cancel

Amazon Web Services

Amazon HealthLake Getting Started

shield-halved-duotone-light-full Cyber Security
AWS HealthLake is a Health Insurance Portability and Accountability Act (HIPAA)-eligible service that helps healthcare organizations store, transform, and analyze health data in the cloud at scale. HealthLake uses the Fast Healthcare…
View full course details Cancel

Amazon Web Services

Amazon Inspector - Getting Started

shield-halved-duotone-light-full Cyber Security
Amazon Inspector is an automated vulnerability management service that continually scans AWS workloads for software vulnerabilities and unintended network exposure. In this 'Getting Started' course you will learn about the purpose and benefits,…
View full course details Cancel

Amazon Web Services

Amazon Location Service Getting Started

shield-halved-duotone-light-full Cyber Security
You can use Amazon Location Service to add location data to applications using maps, places, trackers, and geofences without compromising data security. In this course, you will learn the benefits, typical use cases, and technical concepts of…
View full course details Cancel

Amazon Web Services

Amazon QuickSight Advanced Business Intelligence Authoring (Part 2)

shield-halved-duotone-light-full Cyber Security
This course is part of a two-part series. In this series, learners will learn how to author business intelligence experiences using Amazon QuickSight. In this second course, you will learn practical knowledge on building interactivity, including…
View full course details Cancel

Amazon Web Services

Amazon Security Lake Getting Started

shield-halved-duotone-light-full Cyber Security
With Amazon Security Lake, you can automatically centralize security data from various sources into a purpose-built data lake in your account. These sources include Amazon Web Services (AWS) and software as a service (SaaS) providers, on premises,…
View full course details Cancel

Amazon Web Services

Amazon Simple Storage Service (Amazon S3) Business Continuity and Disaster Recovery

shield-halved-duotone-light-full Cyber Security
Disasters, such as data center failures, cyberattacks, or even user error can cause data loss or corruption. Implementing a business continuity and disaster recovery strategy can help you recover from disasters and data loss and resume operations…
View full course details Cancel

Amazon Web Services

Amazon WorkMail Getting Started

shield-halved-duotone-light-full Cyber Security
Amazon WorkMail provides secure, managed business email and calendaring in the AWS Cloud. You can send and receive email, manage contacts, share calendars, and book resources using familiar client applications. Learn how to use WorkMail for…
View full course details Cancel

IBM

Analyze Security Policies and Controls

shield-halved-duotone-light-full Cyber Security
This credential earner demonstrated their applied knowledge in analyzing and developing security controls for third party applications on the organization’s network. The earner has identified potential risks, and developed a security implementation and disaster recovery plan. The earner will build and develop their transferable skills and gain real industry experience.
View full course details Cancel

IBM

Apply Incident Detection and Response Techniques

shield-halved-duotone-light-full Cyber Security
This credential earner demonstrated their applied knowledge in investigating, identifying, and assessing potential threats in an organization. The earner has implemented hash file analysis techniques, analyzed emails to unveil any concealed threats, and provided a defense containment and recommendation plans. The earner will build and develop their transferable skills and gain real industry experience.
View full course details Cancel

IBM

Assess Network Vulnerabilities

shield-halved-duotone-light-full Cyber Security
This credential earner demonstrated their applied knowledge in conducting a vulnerability assessment for a clinic. The earner has analyzed network scans, conducted an internal and external vulnerability scan, and delivered a report of the findings and recommendations to the stakeholders. The earner will build and develop their transferable skills and gain real industry experience.
View full course details Cancel

Viewing 61-72 of 186