Filter Keyword to...

Category: IT Professionals

Results Per Page :
One of the primary activities within security operations is detecting and responding to security-related incidents. In this course, you'll learn incident management techniques including incident detection,...
[READ MORE]
One of the primary activities within security operations is detecting and responding to security-related incidents. In this course, you'll learn incident management techniques including incident detection, response, mitigation, reporting, and recovery best practices. This course also covers how to use preventative measures such as firewalls, whitelisting and blacklisting, sandboxing, and anti-malware. In addition, you'll be introduced to patch and vulnerability management activities such as patch testing, installation, and deployment. Finally, this course covers change management processes that security professionals regularly take part in as part of security operations, including versioning, baselining, and security impact analyses. This course is one of a series in the Skillsoft learning path that covers the objectives for the Certified Information Systems Security Professional (CISSP) exam.
One of the primary activities within security operations is detecting and responding to security-related incidents. In this course, you'll learn incident management techniques including incident detection, response, mitigation, reporting, and recovery best practices. This course also covers how to use preventative measures such as firewalls, whitelisting and blacklisting, sandboxing, and anti-malware. In addition, you'll be introduced to patch and vulnerability management activities such as patch testing, installation, and deployment. Finally, this course covers change management processes that security professionals regularly take part in as part of security operations, including versioning, baselining, and security impact analyses. This course is one of a series in the Skillsoft learning path that covers the objectives for the Certified Information Systems Security Professional (CISSP) exam.
[READ LESS]
Produced by: SkillSoft
Security professionals are required to anticipate, plan for, respond to, and recover from security incidents quickly and appropriately as part of security operations for the overall organization. In this...
[READ MORE]
Security professionals are required to anticipate, plan for, respond to, and recover from security incidents quickly and appropriately as part of security operations for the overall organization. In this course, you'll learn how to develop and implement recovery strategies, including specific strategies for backup storage, recovery sites, multiple processing sites, and system resilience and fault tolerance requirements. This course also covers best practices for disaster recovery activities, including response, personnel, communications, assessment, restoration, and training and awareness considerations. Finally, you'll learn about organizational safety measures such as business continuity planning, managing physical security of the premises, and addressing personnel safety concerns like employee monitoring and privacy policies. This course is one of a series in the Skillsoft learning path that covers the objectives for the Certified Information Systems Security Professional (CISSP) exam.
Security professionals are required to anticipate, plan for, respond to, and recover from security incidents quickly and appropriately as part of security operations for the overall organization. In this course, you'll learn how to develop and implement recovery strategies, including specific strategies for backup storage, recovery sites, multiple processing sites, and system resilience and fault tolerance requirements. This course also covers best practices for disaster recovery activities, including response, personnel, communications, assessment, restoration, and training and awareness considerations. Finally, you'll learn about organizational safety measures such as business continuity planning, managing physical security of the premises, and addressing personnel safety concerns like employee monitoring and privacy policies. This course is one of a series in the Skillsoft learning path that covers the objectives for the Certified Information Systems Security Professional (CISSP) exam.
[READ LESS]
Produced by: SkillSoft
The fundamental security principles of confidentiality, availability, and integrity guide all successful information security best practices. In this course, you'll learn about applying these security...
[READ MORE]
The fundamental security principles of confidentiality, availability, and integrity guide all successful information security best practices. In this course, you'll learn about applying these security principles, as well as best practices for establishing security governance principles. You'll also explore how best to establish and implement comprehensive security guidelines across the organization. This course is one of a series in the SkillSoft learning path that covers the objectives for the Certified Information Systems Security Professional (CISSP) exam.
The fundamental security principles of confidentiality, availability, and integrity guide all successful information security best practices. In this course, you'll learn about applying these security principles, as well as best practices for establishing security governance principles. You'll also explore how best to establish and implement comprehensive security guidelines across the organization. This course is one of a series in the SkillSoft learning path that covers the objectives for the Certified Information Systems Security Professional (CISSP) exam.
[READ LESS]
Produced by: SkillSoft
While information systems security professionals are not generally involved in software development, they are responsible to assess and implement security controls on software being used within the...
[READ MORE]
While information systems security professionals are not generally involved in software development, they are responsible to assess and implement security controls on software being used within the organizational environment. In this course you'll learn about best practices for implementing and enforcing software security controls. This course also covers best practices for assessing software security effectiveness, such as using change logs and audits, software security risk analysis, and software security acceptance testing. Finally this course covers best practices for assessing security impacts of acquired or third-party software, and software assurance. This course is one of a series in the Skillsoft learning path that covers the objectives for the Certified Information Systems Security Professional (CISSP) exam.
While information systems security professionals are not generally involved in software development, they are responsible to assess and implement security controls on software being used within the organizational environment. In this course you'll learn about best practices for implementing and enforcing software security controls. This course also covers best practices for assessing software security effectiveness, such as using change logs and audits, software security risk analysis, and software security acceptance testing. Finally this course covers best practices for assessing security impacts of acquired or third-party software, and software assurance. This course is one of a series in the Skillsoft learning path that covers the objectives for the Certified Information Systems Security Professional (CISSP) exam.
[READ LESS]
Produced by: SkillSoft
Learn and understand the basic points of knowledge that comprise Internet technologies. We will show you how to build basic Web pages, work with HTML/XML Code. Apply some of the design factors for usability...
[READ MORE]
Learn and understand the basic points of knowledge that comprise Internet technologies. We will show you how to build basic Web pages, work with HTML/XML Code. Apply some of the design factors for usability and navigation states in electronic media. Identify the importance of Quality of Service (QoS), performance issues and their effect on today's web based economy. This course is the first certification in the CIW Certification program, the starting point to a high demand market for Site Designers, Web Server Administration, Web Site Management, or Web Site Developers.
Learn and understand the basic points of knowledge that comprise Internet technologies. We will show you how to build basic Web pages, work with HTML/XML Code. Apply some of the design factors for usability and navigation states in electronic media. Identify the importance of Quality of Service (QoS), performance issues and their effect on today's web based economy. This course is the first certification in the CIW Certification program, the starting point to a high demand market for Site Designers, Web Server Administration, Web Site Management, or Web Site Developers.
[READ LESS]
Produced by: LearnKey
Learn and understand the basic points of knowledge that comprise Internet technologies. We will show you how to manage and maintain the core business software and hardware that organizations use to provide...
[READ MORE]
Learn and understand the basic points of knowledge that comprise Internet technologies. We will show you how to manage and maintain the core business software and hardware that organizations use to provide reliable Internet connectivity. Apply the design factors for usability and navigation states in electronic media. Identify the importance of Quality of Service (QoS), performance issues and their effect on today's web based economy. The CIW Web Foundations Associate series is the starting point to a high demand market for Internet support, Web Server Administration, Web Site Management, or Web Site Developers. There are three exams that comprise of this astute certification; CIW Internet Business Associate, CIW Network Technology Associate, and CIW Site Development Associate. You must successfully pass each exam to achieve the CIW Web Foundations Associate credential. At the end of this training, you will be prepared to pass the CIW Internet Business Associate exam 1D0-51A.
Learn and understand the basic points of knowledge that comprise Internet technologies. We will show you how to manage and maintain the core business software and hardware that organizations use to provide reliable Internet connectivity. Apply the design factors for usability and navigation states in electronic media. Identify the importance of Quality of Service (QoS), performance issues and their effect on today's web based economy. The CIW Web Foundations Associate series is the starting point to a high demand market for Internet support, Web Server Administration, Web Site Management, or Web Site Developers. There are three exams that comprise of this astute certification; CIW Internet Business Associate, CIW Network Technology Associate, and CIW Site Development Associate. You must successfully pass each exam to achieve the CIW Web Foundations Associate credential. At the end of this training, you will be prepared to pass the CIW Internet Business Associate exam 1D0-51A.
[READ LESS]
Produced by: LearnKey
Complete your education of the inner workings of the Internet with the experts at LearnKey. This is the third course in the CIW Web Foundations Associate series. Network Technology Associate e-Learning course...
[READ MORE]
Complete your education of the inner workings of the Internet with the experts at LearnKey. This is the third course in the CIW Web Foundations Associate series. Network Technology Associate e-Learning course picks up where the IC3 GS3 course leaves off. Learn the ins and outs of networking, understand how servers, routers and clients communicate and pass data to each other. Learn to troubleshoot and maintain hardware and software, and learn modern security and system prevention techniques that are vital to the reliability of the working system infrastructure. This is a great course for someone who is looking to start or continue a career in the fast moving world of Internet Information Systems and Networking Support. With the completion of this course students will be prepared to take the CIW Network Technology Associate Certification Exam 1D0-51C.
Complete your education of the inner workings of the Internet with the experts at LearnKey. This is the third course in the CIW Web Foundations Associate series. Network Technology Associate e-Learning course picks up where the IC3 GS3 course leaves off. Learn the ins and outs of networking, understand how servers, routers and clients communicate and pass data to each other. Learn to troubleshoot and maintain hardware and software, and learn modern security and system prevention techniques that are vital to the reliability of the working system infrastructure. This is a great course for someone who is looking to start or continue a career in the fast moving world of Internet Information Systems and Networking Support. With the completion of this course students will be prepared to take the CIW Network Technology Associate Certification Exam 1D0-51C.
[READ LESS]
Produced by: LearnKey
There are a number of specific features and tools for building and deploying Clojure web applications. In this course, you'll learn about development of basic data-driven web applications using Clojure....
[READ MORE]
There are a number of specific features and tools for building and deploying Clojure web applications. In this course, you'll learn about development of basic data-driven web applications using Clojure. You'll also explore working with relational and non-relational data and using Compojure and HTML templating. You'll also learn how to deploy Clojure web applications.
There are a number of specific features and tools for building and deploying Clojure web applications. In this course, you'll learn about development of basic data-driven web applications using Clojure. You'll also explore working with relational and non-relational data and using Compojure and HTML templating. You'll also learn how to deploy Clojure web applications.
[READ LESS]
Produced by: SkillSoft
Clojure - a dialect of Lisp - is a dynamic programming language that compiles to JVM bytecode. In this course, you'll learn the fundamentals of programming with Clojure including basic syntax and using...
[READ MORE]
Clojure - a dialect of Lisp - is a dynamic programming language that compiles to JVM bytecode. In this course, you'll learn the fundamentals of programming with Clojure including basic syntax and using Leiningen to build Clojure programs. You'll also learn about program flow and working with functions and namespaces.
Clojure - a dialect of Lisp - is a dynamic programming language that compiles to JVM bytecode. In this course, you'll learn the fundamentals of programming with Clojure including basic syntax and using Leiningen to build Clojure programs. You'll also learn about program flow and working with functions and namespaces.
[READ LESS]
Produced by: SkillSoft
In a developing landscape where end user applications are moving to a cloud-hosted infrastructure, the traditional application development design life cycle is redefined. The application design process must...
[READ MORE]
In a developing landscape where end user applications are moving to a cloud-hosted infrastructure, the traditional application development design life cycle is redefined. The application design process must be security-aware and must protect cloud-hosted applications and data from an increasing attack vector density. This course covers various aspects of cloud computing relating to the security of cloud-based application software and supporting hardware and services. The course outlines various aspects of application security and access, including designing in security, peripheral security components, and securing access to services and hosted applications. The course covers the essential topics for the ICS2's Certified Cloud Security Professional examination " Domain 4 requirements.
In a developing landscape where end user applications are moving to a cloud-hosted infrastructure, the traditional application development design life cycle is redefined. The application design process must be security-aware and must protect cloud-hosted applications and data from an increasing attack vector density. This course covers various aspects of cloud computing relating to the security of cloud-based application software and supporting hardware and services. The course outlines various aspects of application security and access, including designing in security, peripheral security components, and securing access to services and hosted applications. The course covers the essential topics for the ICS2's Certified Cloud Security Professional examination " Domain 4 requirements.
[READ LESS]
Produced by: SkillSoft
Cloud computing is massively growing in importance in the IT sector as more and more companies are eschewing traditional IT and moving applications and business processes to the cloud. This course covers the...
[READ MORE]
Cloud computing is massively growing in importance in the IT sector as more and more companies are eschewing traditional IT and moving applications and business processes to the cloud. This course covers the concepts behind cloud computing and the key characteristics that make cloud services unique and very valuable to some business scenarios. You'll get a basic technology overview of the concepts and strategies emerging from the cloud and learn how cloud products and services can improve traditional business processes.
Cloud computing is massively growing in importance in the IT sector as more and more companies are eschewing traditional IT and moving applications and business processes to the cloud. This course covers the concepts behind cloud computing and the key characteristics that make cloud services unique and very valuable to some business scenarios. You'll get a basic technology overview of the concepts and strategies emerging from the cloud and learn how cloud products and services can improve traditional business processes.
[READ LESS]
Produced by: SkillSoft
IT security is a concern for most modern organizations and moving to the cloud heightens those concerns for most. The security implications are potentially magnified by large tranches of data existing outside...
[READ MORE]
IT security is a concern for most modern organizations and moving to the cloud heightens those concerns for most. The security implications are potentially magnified by large tranches of data existing outside the immediate control of the organization. Although some of the fears with regard to security in the cloud are exaggerated, there are specific areas to be aware of and cautious about. This course explores some of the key risk areas when it comes to security and cloud computing. It also introduces control assessment frameworks and models that can be used in assessing your risk in going to the cloud and evaluating the cloud provider's security offering. It goes on to outline basic guidelines that you should follow to ensure an adequate level of security in an XaaS environment, including key areas of the IT infrastructure and issues relating to data transfer and storage.
IT security is a concern for most modern organizations and moving to the cloud heightens those concerns for most. The security implications are potentially magnified by large tranches of data existing outside the immediate control of the organization. Although some of the fears with regard to security in the cloud are exaggerated, there are specific areas to be aware of and cautious about. This course explores some of the key risk areas when it comes to security and cloud computing. It also introduces control assessment frameworks and models that can be used in assessing your risk in going to the cloud and evaluating the cloud provider's security offering. It goes on to outline basic guidelines that you should follow to ensure an adequate level of security in an XaaS environment, including key areas of the IT infrastructure and issues relating to data transfer and storage.
[READ LESS]
Produced by: SkillSoft
As we move toward more applications being delivered via the cloud and businesses using a cloud computing model, we also need to consider the implications for the management of identity. This course ensures...
[READ MORE]
As we move toward more applications being delivered via the cloud and businesses using a cloud computing model, we also need to consider the implications for the management of identity. This course ensures you are familiar with identity and access management or IAM and the common industry protocols used to extend identity to the cloud. This course covers the concept of federation between different cryptographic services providers or CSPs and businesses, the need for proper identity and access control management, and it also explores the use of a Cloud Identity as a Service or IDaaS offering. The course also discusses the importance of understanding the presence and privacy factors when conducting business in the cloud and how it is crucial to understand the CSP's responsibility to not only provide security but also a proper level of privacy.
As we move toward more applications being delivered via the cloud and businesses using a cloud computing model, we also need to consider the implications for the management of identity. This course ensures you are familiar with identity and access management or IAM and the common industry protocols used to extend identity to the cloud. This course covers the concept of federation between different cryptographic services providers or CSPs and businesses, the need for proper identity and access control management, and it also explores the use of a Cloud Identity as a Service or IDaaS offering. The course also discusses the importance of understanding the presence and privacy factors when conducting business in the cloud and how it is crucial to understand the CSP's responsibility to not only provide security but also a proper level of privacy.
[READ LESS]
Produced by: SkillSoft
Migrating services to the public cloud has a number of unique challenges. This course explores the steps you should take in determining if your infrastructure has components that are suitable for a cloud...
[READ MORE]
Migrating services to the public cloud has a number of unique challenges. This course explores the steps you should take in determining if your infrastructure has components that are suitable for a cloud solution. It discusses the Service Oriented Architecture or SOA and grid computing, and highlights characteristics that make these infrastructures suitable or unsuitable for extension to the cloud. The course also explores the recommended steps of analyzing your current infrastructure to inventory data, services, and processes used, as well as identifying problem areas that may be addressed through a cloud solution. Upon completion of your analysis, it is time to determine cloud service candidates and match cloud services, as well as look at examples of how to leverage different services to your problem areas. Finally, you'll learn about the use of private clouds as an alternative to public clouds.
Migrating services to the public cloud has a number of unique challenges. This course explores the steps you should take in determining if your infrastructure has components that are suitable for a cloud solution. It discusses the Service Oriented Architecture or SOA and grid computing, and highlights characteristics that make these infrastructures suitable or unsuitable for extension to the cloud. The course also explores the recommended steps of analyzing your current infrastructure to inventory data, services, and processes used, as well as identifying problem areas that may be addressed through a cloud solution. Upon completion of your analysis, it is time to determine cloud service candidates and match cloud services, as well as look at examples of how to leverage different services to your problem areas. Finally, you'll learn about the use of private clouds as an alternative to public clouds.
[READ LESS]
Produced by: SkillSoft
Cloud computing is massively growing in importance in the IT sector as more and more companies are eschewing traditional IT and moving applications and business processes to the cloud. This course provides IT...
[READ MORE]
Cloud computing is massively growing in importance in the IT sector as more and more companies are eschewing traditional IT and moving applications and business processes to the cloud. This course provides IT professionals with a working definition of cloud computing, explores the technological precursors of today's cloud, as well as the current technologies the cloud is dependent on. Also covered are the benefits and drawbacks of cloud computing for the IT department and business as a whole. It then explores in more detail the different types of services that have become available in the cloud with examples of key pioneers in those areas.
Cloud computing is massively growing in importance in the IT sector as more and more companies are eschewing traditional IT and moving applications and business processes to the cloud. This course provides IT professionals with a working definition of cloud computing, explores the technological precursors of today's cloud, as well as the current technologies the cloud is dependent on. Also covered are the benefits and drawbacks of cloud computing for the IT department and business as a whole. It then explores in more detail the different types of services that have become available in the cloud with examples of key pioneers in those areas.
[READ LESS]
Produced by: SkillSoft
Cloud storage is of key interest to many consumers, as it has a number of advantages over traditional data storage. Cloud-stored data is available from any location that has Internet access. However,...
[READ MORE]
Cloud storage is of key interest to many consumers, as it has a number of advantages over traditional data storage. Cloud-stored data is available from any location that has Internet access. However, depending on the type of business and data, some organizations need to carefully evaluate if and what types of regulations and compliance standards may apply to their data. This course provides a closer look at enterprise resources in the cloud and the use of cloud storage services. It describes the importance of classifying your type of data, what type of security regulations or restrictions apply to it, and whether a cloud provider's offering aligns with those requirements. This course also takes a closer look at the protocols, standards, and mobile client access involved in accessing cloud resources. It explores the meaning of open source software and its role in provisioning and accessing cloud resources.
Cloud storage is of key interest to many consumers, as it has a number of advantages over traditional data storage. Cloud-stored data is available from any location that has Internet access. However, depending on the type of business and data, some organizations need to carefully evaluate if and what types of regulations and compliance standards may apply to their data. This course provides a closer look at enterprise resources in the cloud and the use of cloud storage services. It describes the importance of classifying your type of data, what type of security regulations or restrictions apply to it, and whether a cloud provider's offering aligns with those requirements. This course also takes a closer look at the protocols, standards, and mobile client access involved in accessing cloud resources. It explores the meaning of open source software and its role in provisioning and accessing cloud resources.
[READ LESS]
Produced by: SkillSoft
While the cloud is not necessarily dependent on virtualization, it's widely accepted that any competitive cloud will utilize it. Infrastructural and network connectivity considerations of the modern data...
[READ MORE]
While the cloud is not necessarily dependent on virtualization, it's widely accepted that any competitive cloud will utilize it. Infrastructural and network connectivity considerations of the modern data center are greatly influenced by the requirements of the cloud. Data center infrastructure and components must be designed to address security, scalability, disaster recovery, and redundant high-speed connectivity needed to provide a successful cloud service. This course takes a closer look at the main enabling technologies, including data centers and virtualization that allow clouds to function.
While the cloud is not necessarily dependent on virtualization, it's widely accepted that any competitive cloud will utilize it. Infrastructural and network connectivity considerations of the modern data center are greatly influenced by the requirements of the cloud. Data center infrastructure and components must be designed to address security, scalability, disaster recovery, and redundant high-speed connectivity needed to provide a successful cloud service. This course takes a closer look at the main enabling technologies, including data centers and virtualization that allow clouds to function.
[READ LESS]
Produced by: SkillSoft
Learn how to use existing resources in Azure AI Gallery with Azure Machine Learning Studio.
Learn how to use existing resources in Azure AI Gallery with Azure Machine Learning Studio.
[READ LESS]
Produced by: SkillSoft
Discover how to consume models and APIs in Azure Machine Learning Studio.
Discover how to consume models and APIs in Azure Machine Learning Studio.
[READ LESS]
Produced by: SkillSoft
Discover how to clean up your data in Azure Machine Learning Studio using filters, SQL Transformations, and missing and duplicate data features.
Discover how to clean up your data in Azure Machine Learning Studio using filters, SQL Transformations, and missing and duplicate data features.
[READ LESS]
Produced by: SkillSoft
Discover how to deploy models in Azure Machine Learning Studio.
Discover how to deploy models in Azure Machine Learning Studio.
[READ LESS]
Produced by: SkillSoft
Explore different methods of import and export data to and from Azure Machine Learning Studio.
Explore different methods of import and export data to and from Azure Machine Learning Studio.
[READ LESS]
Produced by: SkillSoft
Explore Azure Machine Learning and how to create workspaces, projects, and experiments.
Explore Azure Machine Learning and how to create workspaces, projects, and experiments.
[READ LESS]
Produced by: SkillSoft
Discover how to build neural networks with Microsoft Cognitive Toolkit.
Discover how to build neural networks with Microsoft Cognitive Toolkit.
[READ LESS]
Produced by: SkillSoft
Discover how to optimize and validate models in Azure Machine Learning Studio.
Discover how to optimize and validate models in Azure Machine Learning Studio.
[READ LESS]
Produced by: SkillSoft