Course catalog

Categories

Showing 181-200 of 212 items.

Securing Cryptocurrencies

Explore some of the basic security requirements for cryptocurrencies, as well as some tools that can help you reduce your own exposure to risk.

Securing the IoT: Introduction

Secure the Internet of Things. Explore the types of IoT devices designed to improve the quality of life in homes and businesses, discover how to design IoT security, and more.

Securing the IoT: Privacy

Explore the relationship between security, privacy, and the IoT. Learn about IoT vulnerabilities, privacy concerns, attacks and glitches, and more.

Security Awareness: Social Engineering

Defend your organization from social engineering by learning to recognize and thwart the most common types of attacks.

Security for the SMB: Implementing the NIST Cybersecurity Framework

Learn how to secure the assets, systems, and networks of small and medium business (SMB) using the NIST Cybersecurity Framework.

Security Outsourcing: Vendor Selection and Management

Learn how and why to outsource your cybersecurity program. Find out how to select manage vendors for maximum value.

Security Testing Essential Training

Learn about security testing. Learn how to set up a test environment, plan assessments, identify targets, and execute security tests with popular tools like Nmap and Wireshark.

Security Testing: Nmap Security Scanning

Learn how to use Nmap for port scanning of systems and network devices. Discover how to install Nmap, configure scans, and interpret the output.

Security Testing: Vulnerability Management with Nessus

Fix the flaws in your network before attackers can find them. Learn how to use Nessus, the network automated vulnerability scanner, to detect and resolve system vulnerabilities.

Security Tips Weekly

Want to broaden your knowledge of security? Get tips that can help you take steps to protect your information—no technical pedigree required.

Selling Security to Your Business Leaders

Learn about the top security issues impacting modern companies, how to prevent them, and how to articulate those threats and get buy-in from your team, stakeholders, or clients.

Soft Skills for Information Security Professionals

Information security isn’t all ones and zeros. Learn how to communicate security concepts and proposals in terms that will resonate with audiences of all technical abilities.

SSCP Cert Prep: 1 Access Controls

Prepare for Systems Security Certified Practitioner certification (SSCP). Review the Access Controls domain objectives including identification, authorization, and authentication.

SSCP Cert Prep: 2 Security Operations and Administration

Prepare for the Systems Security Certified Practitioner certification (SSCP). Review the objectives from the Security Operations and Administration domain.

SSCP Cert Prep: 3 Risk Identification, Monitoring, and Analysis

In this installment of the SSCP Cert Prep series, learn about the objectives of Risk Identification, Monitoring, and Analysis—the third domain of the SSCP exam.

SSCP Cert Prep: 4 Incident Response and Recovery

Prepare for the Systems Security Certified Practitioner (SSCP) certification. Review the objectives from the Incident Response and Recovery domain.

SSCP Cert Prep: 5 Cryptography

Prepare for the Systems Security Certified Practitioner certification (SSCP). Review the objectives from the Cryptography domain of the SSCP exam.

SSCP Cert Prep: 6 Networks and Communications Security

Prepare for the Systems Security Certified Practitioner (SSCP) certification. Review the objectives from the Networks and Communications domain of the exam.

SSCP Cert Prep: 7 Systems and Application Security

Prepare for the Systems Security Certified Practitioner (SSCP) certification exam. Review the objectives from Domain 7, Systems and Application Security.

SSCP Cert Prep: The Basics

Get an overview of the 2018 Systems Security Certified Practitioner (SSCP) certification exam.