Course catalog
Showing 7,461-7,480 of 9,127 items.
Securing Windows Server 2016: Managing Privileged Identities
Learn how to manage privileged identities in Windows Server 2016. Explore key topics, including user rights, Privileged Access Management, and how to protect credentials.
Securing Windows Server 2016: Securing Network Infrastructure
Learn how to secure network infrastructure, including virtual machines, in Windows Server 2016.
Securing Windows Server 2016: Server Hardening Solutions
Learn about server hardening solutions for Windows Server 2016. Discover how to configure file and disk encryption, configure patches and updates, and implement antimalware.
Securing Windows Server 2019
Learn how to keep Windows Server 2019 secure. Get practical strategies on topics such as server hardening, mitigating common network threats, and managing privileged identities.
Security Awareness: Social Engineering
Defend your organization from social engineering by learning to recognize and thwart the most common types of attacks.
Security for the SMB: Implementing the NIST Cybersecurity Framework
Learn how to secure the assets, systems, and networks of small and medium business (SMB) using the NIST Cybersecurity Framework.
Security Matters (To Everyone) (206938)
Security affects everyone who uses the internet and shares personal data. Consequently, it's not a concern that should be confined to your organization's information security department. Here, join Mandy Huth—the director of information security at Smarsh—as she shares tips that can empower you to keep your own data safe, as well as convey the significance of information security to others in your company. Learn how to talk about security with non-security people, build a security-minded culture, sell security to customers, collaborate with IT, protect yourself and your family from security threats, and more.
Security Outsourcing: Vendor Selection and Management
Learn how and why to outsource your cybersecurity program. Find out how to select manage vendors for maximum value.
Security Testing
Learn how to set up automated security testing for your software delivery workflow, including continuous integration/continuous delivery pipelines.
Security Testing Essential Training
Learn about security testing. Learn how to set up a test environment, plan assessments, identify targets, and execute security tests with popular tools like Nmap and Wireshark.
Security Testing: Nmap Security Scanning
Learn how to use Nmap for port scanning of systems and network devices. Discover how to install Nmap, configure scans, and interpret the output.
Security Testing: Nmap Security Scanning (218906)
Nmap is a powerful network discovery and security auditing tool that's widely used in the cybersecurity community. In this course, learn how to use this open-source tool for port scanning of systems and network devices. Instructor Mike Chapple demonstrates how to install Nmap, configure scans, and interpret the output. Plus, he wraps up the course with a series of hands-on case studies, providing you with an opportunity to perform your own Nmap scans and check your results.
Security Testing: Vulnerability Management with Nessus
Fix the flaws in your network before attackers can find them. Learn how to use Nessus, the network automated vulnerability scanner, to detect and resolve system vulnerabilities.
Security Tips Weekly
Want to broaden your knowledge of security? Get tips that can help you take steps to protect your information—no technical pedigree required.
Security Tips: Protecting Sensitive Information (227559)
While we often think of our communications channels as secure, it never hurts to add an extra layer of protection when working with sensitive information. Whether it’s personal documents, trade secrets, or any other kind of information that could be misused in the wrong hands, knowing how to secure data is a skill that anyone can benefit from. Learn tips to protect and exchange your sensitive information using encryption and other tools. In this course, instructor Scott Simpson discusses the basics of encryption and demonstrates how to protect sensitive information using encrypted files, disks, and disk images. He introduces encryption tools for every operating system—including BitLocker, FileVault, and LUKS—as well as the cross-platform VeraCrypt app. Plus, learn best practices for multilayer security, web connections, VPN, email, and cloud storage.
SED Essential Training
Unlock the power of SED, the simple but powerful command line tool for extracting, transforming, and manipulating data in files and data streams.
Selecting and Managing a Project Portfolio with Microsoft Project
Follow along with project management expert Bonnie Biafore as she shares her tips for using Microsoft Project 2016 to select projects based on goals and performance measures.
Selenium Essential Training
Learn more about Selenium, including how to improve your use of WebDriver, advanced locators, component interactions, synchronizations, and more.
Self Directed Career
In a world where the average employee sends and receives 122 emails per day and attends an average of 62 meetings per month, your boss or HR simply doesn’t have the time or bandwidth to properly think through how best to deploy your talents moving forward. Instead, we have to take control of our career planning to ensure we’re putting ourselves in position for long-term growth.
Self-Compassion: The Proven Power of Being Kind to Yourself (Blinkist Summary)
Learn how to be more kind to yourself by practicing the skill of self-compassion. Get tips for eliminating self-criticism and more, in this short audiobook.