In this Network Security Fundamentals course you will gain an understanding of the fundamental tenants of network security and review the general concepts involved in maintaining a secure network computing environment. Upon successful completion of this course you will be able to describe general network security concepts and implement basic network security configuration … [Read more...] about Palo Alto Networks Network Security Fundamentals
Security
Cybersecurity Awareness and Innovation
It’s not you, it’s me! What’s going on? This course empowers students, professionals and the wider community to deal with cybersecurity attacks and risks focused on identity management and it is an introduction to the upcoming full course focused on cybersecurity awareness. It provides a practical overview of challenging issues like identity credentials management and … [Read more...] about Cybersecurity Awareness and Innovation
Personnel & Third-Party Security
In this course, you will learn all about the process of implementing effective education, training, and awareness programs. You will also study the role personnel security plays in protecting an organization’s assets, intellectual property, and physical assets. You will also be introduced to the steps required for effective Vendor Risk Management (VRM), including: due … [Read more...] about Personnel & Third-Party Security
Cryptography
Welcome to Cryptography! Cryptography is the practice and study of techniques for securing communications in the presence of third parties. You will learn how to protect information in order to ensure its integrity, confidentiality, authenticity, and non-repudiation. You will come out with a basic understanding of cryptographic concepts and how to apply them, implement secure … [Read more...] about Cryptography
Introduction to Enterprise Resiliency
Resiliency is the ability to provide the required capability in the face of adversity, without significant impact. This is not something that just happens, but rather must be thoroughly planned for and tested, including: 1. Keeping hardware, the operating system, middleware, and applications up and running throughout planned and unplanned outages 2. Recovering a site from an … [Read more...] about Introduction to Enterprise Resiliency