Filter Keyword to...

Category: Technology

Results Per Page :
Network scanning refers to a set of intelligence gathering procedures hackers perform to identify hosts, ports, and other vulnerabilities in a network. By finding such vulnerabilities, a hacker can create an...
[READ MORE]
Network scanning refers to a set of intelligence gathering procedures hackers perform to identify hosts, ports, and other vulnerabilities in a network. By finding such vulnerabilities, a hacker can create an accurate profile of the target organization. An ethical hacker is a person who attacks an organization's security on behalf of its owners in order to discover vulnerabilities. Instead of taking advantage of these vulnerabilities, the ethical hacker reports them to the organization who can then put in place the appropriate countermeasures to protect themselves against malicious hackers. In this course, we look at network scanning, and the tools and techniques used. This course is the third in a series of courses which can used in preparation for the Certified Ethical Hacker v8, 312-50, exam. The course has been developed in partnership with EC-Council and is based on their Ethical Hacking and Countermeasures V8 course materials and labs.
Network scanning refers to a set of intelligence gathering procedures hackers perform to identify hosts, ports, and other vulnerabilities in a network. By finding such vulnerabilities, a hacker can create an accurate profile of the target organization. An ethical hacker is a person who attacks an organization's security on behalf of its owners in order to discover vulnerabilities. Instead of taking advantage of these vulnerabilities, the ethical hacker reports them to the organization who can then put in place the appropriate countermeasures to protect themselves against malicious hackers. In this course, we look at network scanning, and the tools and techniques used. This course is the third in a series of courses which can used in preparation for the Certified Ethical Hacker v8, 312-50, exam. The course has been developed in partnership with EC-Council and is based on their Ethical Hacking and Countermeasures V8 course materials and labs.
[READ LESS]
Produced by: SkillSoft
Sniffing is the act of capturing data as it is transferred over a network. The data can then be recorded and used for reconnaissance, or used in an attack. In this course we look at sniffing, the tools and...
[READ MORE]
Sniffing is the act of capturing data as it is transferred over a network. The data can then be recorded and used for reconnaissance, or used in an attack. In this course we look at sniffing, the tools and techniques used, protocols that can be spoofed and countermeasures and penetration testing. An ethical hacker is a person who attacks an organizations security on behalf of its owners in order to discover vulnerabilities. Instead of taking advantage of these vulnerabilities, the ethical hacker reports them to the organization who can then put in place the appropriate countermeasures to protect themselves against malicious hackers. This course is the seventh in a series of courses which can used in preparation for the Certified Ethical Hacker v8, 312-50, exam. The course has been developed in partnership with EC-Council and is based on their Ethical Hacking and Countermeasures V8 course materials and labs.
Sniffing is the act of capturing data as it is transferred over a network. The data can then be recorded and used for reconnaissance, or used in an attack. In this course we look at sniffing, the tools and techniques used, protocols that can be spoofed and countermeasures and penetration testing. An ethical hacker is a person who attacks an organizations security on behalf of its owners in order to discover vulnerabilities. Instead of taking advantage of these vulnerabilities, the ethical hacker reports them to the organization who can then put in place the appropriate countermeasures to protect themselves against malicious hackers. This course is the seventh in a series of courses which can used in preparation for the Certified Ethical Hacker v8, 312-50, exam. The course has been developed in partnership with EC-Council and is based on their Ethical Hacking and Countermeasures V8 course materials and labs.
[READ LESS]
Produced by: SkillSoft
Social Engineering is the art of manipulating people and getting them to disclose important information about themselves or their organization. This course describes different methods used by attackers, the...
[READ MORE]
Social Engineering is the art of manipulating people and getting them to disclose important information about themselves or their organization. This course describes different methods used by attackers, the consequences of social engineering and how to prevent it. This course is the eight in a series of courses which can used in preparation for the Certified Ethical Hacker v8, 312-50, exam. The course has been developed in partnership with EC-Council and is based on their Ethical Hacking and Countermeasures V8 course materials and labs.
Social Engineering is the art of manipulating people and getting them to disclose important information about themselves or their organization. This course describes different methods used by attackers, the consequences of social engineering and how to prevent it. This course is the eight in a series of courses which can used in preparation for the Certified Ethical Hacker v8, 312-50, exam. The course has been developed in partnership with EC-Council and is based on their Ethical Hacking and Countermeasures V8 course materials and labs.
[READ LESS]
Produced by: SkillSoft
SQL injection is a type of attack where code to manipulate a back-end database is entered into a web application. This code could be a means to harvest authentication information, escalate privileges, or...
[READ MORE]
SQL injection is a type of attack where code to manipulate a back-end database is entered into a web application. This code could be a means to harvest authentication information, escalate privileges, or simply cause a denial-of-service. In this course, we look at SQL injection attacks, the associated tools and techniques used, and mitigation strategies. An ethical hacker is a person who attacks an organization's security on behalf of its owners in order to discover vulnerabilities. Instead of taking advantage of these vulnerabilities, the ethical hacker reports them to the organization who can then put in place the appropriate countermeasures to protect themselves against malicious hackers.This course is the twelfth in a series of courses, which can used in preparation for the Certified Ethical Hacker v8, 312-50, exam. The course has been developed in partnership with EC-Council and is based on their Ethical Hacking and Countermeasures V8 course materials and labs.
SQL injection is a type of attack where code to manipulate a back-end database is entered into a web application. This code could be a means to harvest authentication information, escalate privileges, or simply cause a denial-of-service. In this course, we look at SQL injection attacks, the associated tools and techniques used, and mitigation strategies. An ethical hacker is a person who attacks an organization's security on behalf of its owners in order to discover vulnerabilities. Instead of taking advantage of these vulnerabilities, the ethical hacker reports them to the organization who can then put in place the appropriate countermeasures to protect themselves against malicious hackers.This course is the twelfth in a series of courses, which can used in preparation for the Certified Ethical Hacker v8, 312-50, exam. The course has been developed in partnership with EC-Council and is based on their Ethical Hacking and Countermeasures V8 course materials and labs.
[READ LESS]
Produced by: SkillSoft
System hacking is a set of techniques aimed at gaining access to target systems, maintaining that access, and covering tracks to prevent anyone finding evidence of the access. In this course, we look at...
[READ MORE]
System hacking is a set of techniques aimed at gaining access to target systems, maintaining that access, and covering tracks to prevent anyone finding evidence of the access. In this course, we look at system hacking, and the tools and techniques used. An ethical hacker is a person who attacks an organization's security on behalf of its owners in order to discover vulnerabilities. Instead of taking advantage of these vulnerabilities, the ethical hacker reports them to the organization who can then put in place the appropriate countermeasures to protect themselves against malicious hackers. This course is the fifth in a series of courses which can used in preparation for the Certified Ethical Hacker v8, 312-50, exam. The course has been developed in partnership with EC-Council and is based on their Ethical Hacking and Countermeasures V8 course materials and labs.
System hacking is a set of techniques aimed at gaining access to target systems, maintaining that access, and covering tracks to prevent anyone finding evidence of the access. In this course, we look at system hacking, and the tools and techniques used. An ethical hacker is a person who attacks an organization's security on behalf of its owners in order to discover vulnerabilities. Instead of taking advantage of these vulnerabilities, the ethical hacker reports them to the organization who can then put in place the appropriate countermeasures to protect themselves against malicious hackers. This course is the fifth in a series of courses which can used in preparation for the Certified Ethical Hacker v8, 312-50, exam. The course has been developed in partnership with EC-Council and is based on their Ethical Hacking and Countermeasures V8 course materials and labs.
[READ LESS]
Produced by: SkillSoft
The healthcare industry is becoming increasingly vulnerable to technology and security risk. The widespread adoption of electronic health records (EHR) combined with frequent regulatory reform is creating...
[READ MORE]
The healthcare industry is becoming increasingly vulnerable to technology and security risk. The widespread adoption of electronic health records (EHR) combined with frequent regulatory reform is creating rapid change in the industry. An increased network of data connectivity, while designed to improve the delivery of patient care, is also creating opportunity for hackers and others to take advantage of tremendously valuable medical information. Cyber security is fast becoming a critical component of healthcare data exchange and management. As major security breaches continue to top the news; governments and regulatory organizations are responding with new regulations, increased oversight, and stiffer penalties. Increased demand for mobility, along with a move to link a wide variety of systems to IT infrastructure, adds to the overall risk. As a result, healthcare cyber security has grown from a component of security to a category in and of itself. 4Medapproved in cooperation with Kardon Compliance has developed a certification path for security professionals to inform their awareness of this critical area of data protection and achieve proficiency in Cyber security management and execution in the workplace.
The healthcare industry is becoming increasingly vulnerable to technology and security risk. The widespread adoption of electronic health records (EHR) combined with frequent regulatory reform is creating rapid change in the industry. An increased network of data connectivity, while designed to improve the delivery of patient care, is also creating opportunity for hackers and others to take advantage of tremendously valuable medical information. Cyber security is fast becoming a critical component of healthcare data exchange and management. As major security breaches continue to top the news; governments and regulatory organizations are responding with new regulations, increased oversight, and stiffer penalties. Increased demand for mobility, along with a move to link a wide variety of systems to IT infrastructure, adds to the overall risk. As a result, healthcare cyber security has grown from a component of security to a category in and of itself. 4Medapproved in cooperation with Kardon Compliance has developed a certification path for security professionals to inform their awareness of this critical area of data protection and achieve proficiency in Cyber security management and execution in the workplace.
[READ LESS]
Produced by: 4MedPlus
Discover how assessing IT asset risks and applying appropriate data privacy standards helps keep sensitive data from unauthorized entities in preparation for the CISA exam.
Discover how assessing IT asset risks and applying appropriate data privacy standards helps keep sensitive data from unauthorized entities in preparation for the CISA exam.
[READ LESS]
Produced by: SkillSoft
Explore the variety of methods through which stored data can be secured and made highly available, despite the realization of malware threats, as you prepare for the CISA exam.
Explore the variety of methods through which stored data can be secured and made highly available, despite the realization of malware threats, as you prepare for the CISA exam.
[READ LESS]
Produced by: SkillSoft
Explore how multifactor authentication and role-based access control lessen the risk of system compromise and privilege abuse, and how data classification uses tags to organize data, in preparation for the...
[READ MORE]
Explore how multifactor authentication and role-based access control lessen the risk of system compromise and privilege abuse, and how data classification uses tags to organize data, in preparation for the CISA exam.
Explore how multifactor authentication and role-based access control lessen the risk of system compromise and privilege abuse, and how data classification uses tags to organize data, in preparation for the CISA exam.
[READ LESS]
Produced by: SkillSoft
Discover the keys to conducting a successful audit - the nature of a business, its driving processes, and its underlying IT solutions. Examine controls and audit reporting in preparation for the CISA exam.
Discover the keys to conducting a successful audit - the nature of a business, its driving processes, and its underlying IT solutions. Examine controls and audit reporting in preparation for the CISA exam.
[READ LESS]
Produced by: SkillSoft
Explore how IT management frameworks provide a structured approach to managing and auditing IT assets and how risk assessments often drive the IS audit in preparation for the CISA exam.
Explore how IT management frameworks provide a structured approach to managing and auditing IT assets and how risk assessments often drive the IS audit in preparation for the CISA exam.
[READ LESS]
Produced by: SkillSoft
Efficient delivery of IT systems includes cost reduction and optimized system performance. Discover how a structured approach for implementing changes and patches can reduce security incidents and downtime,...
[READ MORE]
Efficient delivery of IT systems includes cost reduction and optimized system performance. Discover how a structured approach for implementing changes and patches can reduce security incidents and downtime, in preparation for the CISA exam.
Efficient delivery of IT systems includes cost reduction and optimized system performance. Discover how a structured approach for implementing changes and patches can reduce security incidents and downtime, in preparation for the CISA exam.
[READ LESS]
Produced by: SkillSoft
Explore how PKI provides a hierarchy of digital security certificates used to secure data and authenticate users and devices and how data is protected with encryption and file integrity verification, as you...
[READ MORE]
Explore how PKI provides a hierarchy of digital security certificates used to secure data and authenticate users and devices and how data is protected with encryption and file integrity verification, as you prepare for the CISA exam.
Explore how PKI provides a hierarchy of digital security certificates used to secure data and authenticate users and devices and how data is protected with encryption and file integrity verification, as you prepare for the CISA exam.
[READ LESS]
Produced by: SkillSoft
Explore systems planning, testing, integration, and delivery to ensure the timely delivery of system changes or entire new solutions, as you prepare for the CISA exam.
Explore systems planning, testing, integration, and delivery to ensure the timely delivery of system changes or entire new solutions, as you prepare for the CISA exam.
[READ LESS]
Produced by: SkillSoft
Explore how virtualization provides efficient hardware usage and security boundaries and how cloud computing tracks pooled IT resource usage and charges fees accordingly as you prepare for the CISA exam.
Explore how virtualization provides efficient hardware usage and security boundaries and how cloud computing tracks pooled IT resource usage and charges fees accordingly as you prepare for the CISA exam.
[READ LESS]
Produced by: SkillSoft
Oracle Certified Java Associate course is designed to enable students with little or no programming experience to begin to learn programming using the Java programming language. The course teaches the...
[READ MORE]
Oracle Certified Java Associate course is designed to enable students with little or no programming experience to begin to learn programming using the Java programming language. The course teaches the significance of object-oriented programming, the keywords and constructs of the Java programming language, and the steps required to create simple Java technology programs. Students taking this course can receive a solid basis in the Java programming language upon which to base continued work and training. The course features the Java Platform, Standard Edition 6 (Java SE 6) platform, and uses the Java SE Development Kit 6 (JDK 6) product.
Oracle Certified Java Associate course is designed to enable students with little or no programming experience to begin to learn programming using the Java programming language. The course teaches the significance of object-oriented programming, the keywords and constructs of the Java programming language, and the steps required to create simple Java technology programs. Students taking this course can receive a solid basis in the Java programming language upon which to base continued work and training. The course features the Java Platform, Standard Edition 6 (Java SE 6) platform, and uses the Java SE Development Kit 6 (JDK 6) product.
[READ LESS]
Produced by: LearnKey
This program provides a comprehensive overview of MACRA and the Merit-Based Incentive Payment Incentive (MIPS), the new CMS reimbursement program. It covers all required performance categories, including...
[READ MORE]
This program provides a comprehensive overview of MACRA and the Merit-Based Incentive Payment Incentive (MIPS), the new CMS reimbursement program. It covers all required performance categories, including Advancing Care Information (formerly MU), Quality and Cost (formerly PQRS and VM), and Improvement Activities (new). Participants who earn the CMHP certification are qualified to project manage all elements of a healthcare organization’s MIPS reporting and MACRA program oversight.
This program provides a comprehensive overview of MACRA and the Merit-Based Incentive Payment Incentive (MIPS), the new CMS reimbursement program. It covers all required performance categories, including Advancing Care Information (formerly MU), Quality and Cost (formerly PQRS and VM), and Improvement Activities (new). Participants who earn the CMHP certification are qualified to project manage all elements of a healthcare organization’s MIPS reporting and MACRA program oversight.
[READ LESS]
Produced by: 4MedPlus
This program describes the Quality and Cost performance categories of MACRA-MIPS, which replace PQRS and the Value-Based Modifier program. It covers all required information to successfully participate in...
[READ MORE]
This program describes the Quality and Cost performance categories of MACRA-MIPS, which replace PQRS and the Value-Based Modifier program. It covers all required information to successfully participate in MIPS Quality and Cost, which make up 60 percent of a provider’s MIPS score.
This program describes the Quality and Cost performance categories of MACRA-MIPS, which replace PQRS and the Value-Based Modifier program. It covers all required information to successfully participate in MIPS Quality and Cost, which make up 60 percent of a provider’s MIPS score.
[READ LESS]
Produced by: 4MedPlus
The (ISC)² Certified Information Systems Security Professional (CISSP) exam has been reorganized for 2015. No content has been removed, but there has been lots of reorganization, and the context of existing...
[READ MORE]
The (ISC)² Certified Information Systems Security Professional (CISSP) exam has been reorganized for 2015. No content has been removed, but there has been lots of reorganization, and the context of existing information is subtly different. This Skillsoft course will get you on the right track to begin your CISSP study.
The (ISC)² Certified Information Systems Security Professional (CISSP) exam has been reorganized for 2015. No content has been removed, but there has been lots of reorganization, and the context of existing information is subtly different. This Skillsoft course will get you on the right track to begin your CISSP study.
[READ LESS]
Produced by: SkillSoft
In this course youll learn how to configure categories and chat room policies. Conferencing provides a means for users to have meetings to facilitate collaboration. In this course, youll also learn how to...
[READ MORE]
In this course youll learn how to configure categories and chat room policies. Conferencing provides a means for users to have meetings to facilitate collaboration. In this course, youll also learn how to manage meetings. This course aligns with exam 70-334, Core Solutions of Microsoft Skype for Business 2015.
In this course youll learn how to configure categories and chat room policies. Conferencing provides a means for users to have meetings to facilitate collaboration. In this course, youll also learn how to manage meetings. This course aligns with exam 70-334, Core Solutions of Microsoft Skype for Business 2015.
[READ LESS]
Produced by: SkillSoft
Explore the concept of environment in Chef and the various attributes that can be applied in the environment, Chef Habitat, and Chef Automate. Examine the components used to build templates in Chef, as well...
[READ MORE]
Explore the concept of environment in Chef and the various attributes that can be applied in the environment, Chef Habitat, and Chef Automate. Examine the components used to build templates in Chef, as well as how to setup and configure Chef Client and Knife, generate Chef cookbooks, install Kitchen, work with Test Kitchen, install Chef Habitat, and work with Chef Habitat Builder. How to create recipes using template files and work with Chef Automate to automate infrastructure orchestration is also covered.
Explore the concept of environment in Chef and the various attributes that can be applied in the environment, Chef Habitat, and Chef Automate. Examine the components used to build templates in Chef, as well as how to setup and configure Chef Client and Knife, generate Chef cookbooks, install Kitchen, work with Test Kitchen, install Chef Habitat, and work with Chef Habitat Builder. How to create recipes using template files and work with Chef Automate to automate infrastructure orchestration is also covered.
[READ LESS]
Produced by: SkillSoft
Explore the implementation of Infrastructure as Code with Chef for DevOps, including the core principles, benefits, and components of Chef that are involved. Examine features, components, and tools of...
[READ MORE]
Explore the implementation of Infrastructure as Code with Chef for DevOps, including the core principles, benefits, and components of Chef that are involved. Examine features, components, and tools of Workstation, the features and components of Cookbook, and the types of nodes that can be managed using Chef. How to set up Git to create a Chef repository, install Chef server, set up a Workstation, and work with Hosted Chef are also covered.
Explore the implementation of Infrastructure as Code with Chef for DevOps, including the core principles, benefits, and components of Chef that are involved. Examine features, components, and tools of Workstation, the features and components of Cookbook, and the types of nodes that can be managed using Chef. How to set up Git to create a Chef repository, install Chef server, set up a Workstation, and work with Hosted Chef are also covered.
[READ LESS]
Produced by: SkillSoft
Using a Chef server can accelerate the process of deploying cookbooks while providing visibility into the state of your infrastructure. This course will focus on Chef server policy and remotely deploying...
[READ MORE]
Using a Chef server can accelerate the process of deploying cookbooks while providing visibility into the state of your infrastructure. This course will focus on Chef server policy and remotely deploying cookbooks.
Using a Chef server can accelerate the process of deploying cookbooks while providing visibility into the state of your infrastructure. This course will focus on Chef server policy and remotely deploying cookbooks.
[READ LESS]
Produced by: SkillSoft
Quickly communicate with colleagues using Circuit's IM and call features. Discover how to use the instant messenger, make audio and video calls, and use the various messaging tools to get people's attention...
[READ MORE]
Quickly communicate with colleagues using Circuit's IM and call features. Discover how to use the instant messenger, make audio and video calls, and use the various messaging tools to get people's attention and manage your conversations.
Quickly communicate with colleagues using Circuit's IM and call features. Discover how to use the instant messenger, make audio and video calls, and use the various messaging tools to get people's attention and manage your conversations.
[READ LESS]
Produced by: SkillSoft
Circuit is a collaboration and communication tool for online meetings and video conferencing. Discover how to sign in to Circuit and edit your user preferences, send invitations to other users, and begin to...
[READ MORE]
Circuit is a collaboration and communication tool for online meetings and video conferencing. Discover how to sign in to Circuit and edit your user preferences, send invitations to other users, and begin to get to know the application.
Circuit is a collaboration and communication tool for online meetings and video conferencing. Discover how to sign in to Circuit and edit your user preferences, send invitations to other users, and begin to get to know the application.
[READ LESS]
Produced by: SkillSoft