Title |
Length of Time |
Description |
Improve Your Data Governance and Security Skills (Training Course) |
6 hours and 4 minutes |
Business leaders, tech team managers, entrepreneurs, and anyone involved in the digital transformation of businesses and institutions will need a solid grounding in managing data and information. These foundational skills are rapidly becoming a legal necessity for anyone working in tech. Get started now! |
Security Tips Weekly |
3 hours 23 minutes |
Business leaders, tech team managers, entrepreneurs, and anyone involved in the digital transformation of businesses and institutions will need a solid grounding in managing data and information. These foundational skills are rapidly becoming a legal necessity for anyone working in tech. Get started now! |
Security Matters (To Everyone) |
33 minutes 8 seconds |
Business leaders, tech team managers, entrepreneurs, and anyone involved in the digital transformation of businesses and institutions will need a solid grounding in managing data and information. These foundational skills are rapidly becoming a legal necessity for anyone working in tech. Get started now! |
IT Security: Key Policies and Resources |
33 Minutes 8 seconds |
This course seeks to make key cybersecurity policies and resources clear and understandable - whether you work in IT, in business, or are just interested in how information security fits in with our public policies and laws. |
Learning Computer Security and Internet Safety |
1 hour 18 minutes |
Learn how to secure your Windows computer and protect your privancy online, in thi sbeginner's guide to computer security and internet safety. |
Information Management: Document Security |
1 hour 2 minutes |
Business leaders, tech team managers, entrepreneurs, and anyone involved in the digital transformation of businesses and institutions will need a solid grounding in managing data and information. These foundational skills are rapidly becoming a legal necessity for anyone working in tech. Get started now! |
Human Resources: Protecting Confidentiality |
50 minutes 4 seconds |
Learn abou the importance and responsibility of protecting confidentiality in the workplace. |
Learning Ransomware Countermeasures |
1 hour 37 minutes |
Learn how to prevent and respond to ransomware attack. Get an overview of the types of ransomware, and learn ways to safeguard your computer from attack. |
JavaScript: Security Essentials |
45 minutes 23 seconds |
Ensure that your JavaScript applications are secure. Learn how to create more resilient code by effectively dealing with challenges such as cross-site forgery, server-side injection, and more. |
iOS Development: Security |
2 hours 6 minutes |
Learn development practices for buiolding secure iOS apps. Discover how to safeguard your apps from current and future threats using the keychain, biometrics, asymmetic cryptography, and more. |
Node.js: Security |
52 minutes 31 Seconds |
Learn best practices that can help Node.js Developer secure their apps at all levels, from packages to the server level. |
React: Security Applications |
1 hour 37 minutes |
Learn how to reinforce the security of your React applications, protecting your code, data, users, servers, and more. |
SQL Server: Security for Developers |
1 hour 27 minutes |
Learn how to protect databases and preserve the integrity of an organization's data by configuring security settings in SQL Server. |
Security Android Apps |
1 hour 44 minutes |
Find out how to secure Android apps. Explore the Android Security Model, and Learn techniques to increasingly harden an Android App, secure known vulnerabilities, and test your work. |
Browsing the Web Securely |
43 minutes 42 seconds |
Discover how to protect your information, including your identity , your location, and data, while browsing the web. Learn how to set up a personal VPN and use an anonymizing browser. |
MongoDB: Security |
2 hours 21 minutes |
Discover how to create secured deployments of MongoDB for production-ready environments. |
Cybersecurity Awareness: Security for Cloud Services |
54 minutes 15 seconds |
Learn about the different types of cloud service offerings, the advantages and disadvantages of cloud security, and risk mitigation strategies. |
Programming Foundations: Web Security |
2 hours 17 seconds |
Learn about the most important security concerns when developing websites, and what you can do to keep your servers, software, and data safe from harm. |
AWS Security Best Practices for Developers |
46 minutes 31 seconds |
Create stronger, more secure applications for AWS deployment. Learn security best practices for Identity and Access Management, S3 Storage, Key Management Service (KMS), and Cognito. |
Securing Windows Server 2016: Securing Network Infrastructure |
1 Hour 33 Minutes |
Learn how to secure network infrastructure, including virtual machines, in Windows Server 2016 |
SQL Server: Security, Encryption, and Masking |
1 Hour |
Learn how to build more secure applications using the advanced security features in SQL Server 2017: row-level security, data encryption, and data masking. |
Securing Windows Server 2016: Server Hardening Solutions |
1 hour 11 minutes |
Learn about server hardening solutions for Windows Server 2016. Discover how to configure file and disk encryption, configure patches and updates, and implement antimalware. |