186 courses available
Amazon Web Services
Amazon EKS Security
Cyber SecurityIn this course, you learn how to add security to your Amazon EKS cluster and which tools and services you can use to protect your clusters. You learn about key Amazon EKS security topics such as securing your images, understanding and restricting…
Amazon Web Services
Amazon Elastic File System (Amazon EFS) Primer
Cyber SecurityAmazon Elastic File System (Amazon EFS) provides a practical, serverless, set-and-forget elastic file system for use with Amazon Web Services (AWS) Cloud services and on-premises resources. It is built to scale on demand to petabytes without…
Amazon Web Services
Amazon HealthLake Getting Started
Cyber SecurityAWS HealthLake is a Health Insurance Portability and Accountability Act (HIPAA)-eligible service that helps healthcare organizations store, transform, and analyze health data in the cloud at scale. HealthLake uses the Fast Healthcare…
Amazon Web Services
Amazon Inspector - Getting Started
Cyber SecurityAmazon Inspector is an automated vulnerability management service that continually scans AWS workloads for software vulnerabilities and unintended network exposure. In this 'Getting Started' course you will learn about the purpose and benefits,…
Amazon Web Services
Amazon Location Service Getting Started
Cyber SecurityYou can use Amazon Location Service to add location data to applications using maps, places, trackers, and geofences without compromising data security. In this course, you will learn the benefits, typical use cases, and technical concepts of…
Amazon Web Services
Amazon QuickSight Advanced Business Intelligence Authoring (Part 2)
Cyber SecurityThis course is part of a two-part series. In this series, learners will learn how to author business intelligence experiences using Amazon QuickSight. In this second course, you will learn practical knowledge on building interactivity, including…
Amazon Web Services
Amazon Security Lake Getting Started
Cyber SecurityWith Amazon Security Lake, you can automatically centralize security data from various sources into a purpose-built data lake in your account. These sources include Amazon Web Services (AWS) and software as a service (SaaS) providers, on premises,…
Amazon Web Services
Amazon Simple Storage Service (Amazon S3) Business Continuity and Disaster Recovery
Cyber SecurityDisasters, such as data center failures, cyberattacks, or even user error can cause data loss or corruption. Implementing a business continuity and disaster recovery strategy can help you recover from disasters and data loss and resume operations…
Amazon Web Services
Amazon WorkMail Getting Started
Cyber SecurityAmazon WorkMail provides secure, managed business email and calendaring in the AWS Cloud. You can send and receive email, manage contacts, share calendars, and book resources using familiar client applications. Learn how to use WorkMail for…
IBM
Analyze Security Policies and Controls
Cyber SecurityThis credential earner demonstrated their applied knowledge in analyzing and developing security controls for third party applications on the organization’s network. The earner has identified potential risks, and developed a security implementation and disaster recovery plan. The earner will build and develop their transferable skills and gain real industry experience.
IBM
Apply Incident Detection and Response Techniques
Cyber SecurityThis credential earner demonstrated their applied knowledge in investigating, identifying, and assessing potential threats in an organization. The earner has implemented hash file analysis techniques, analyzed emails to unveil any concealed threats, and provided a defense containment and recommendation plans. The earner will build and develop their transferable skills and gain real industry experience.
IBM
Assess Network Vulnerabilities
Cyber SecurityThis credential earner demonstrated their applied knowledge in conducting a vulnerability assessment for a clinic. The earner has analyzed network scans, conducted an internal and external vulnerability scan, and delivered a report of the findings and recommendations to the stakeholders. The earner will build and develop their transferable skills and gain real industry experience.
Viewing 61-72 of 186