This course sensitizes regarding privacy and data protection in Big Data environments. You will discover privacy preserving methodologies, as well as data protection regulations and concepts in your Big Data system. By the end of the course, you will be ready to plan your next Big Data project successfully, ensuring that all privacy and data protection related issues are under … [Read more...] about Security and Privacy for Big Data – Part 2
Security
Digital Forensics Concepts
In the Digital Forensics Concepts course, you will learn about legal considerations applicable to computer forensics and how to identify, collect and preserve digital evidence. This course dives into the scientific principles relating to digital forensics and gives you a close look at on-scene triaging, keyword lists, grep, file hashing, report writing and the profession of … [Read more...] about Digital Forensics Concepts
Execution, persistence, privilege escalation and evasion
This course is a continuation of Python for Cybersecurity. The topics covered are execution, persistence, privilege escalation and evasion. … [Read more...] about Execution, persistence, privilege escalation and evasion
Introduction to Cybersecurity Essentials
Build key skills needed to recognize common security threats and risks. Discover the characteristics of cyber-attacks and learn how organizations employ best practices to guard against them. Designed specifically for beginners and those who are interested in a Cyber Analyst I or an entry-level Cloud & Security Engineer role, this course dives into the world of cybersecurity to … [Read more...] about Introduction to Cybersecurity Essentials
In the Trenches: Security Operations Center
Cyber-attacks, breaches, and incidents continue to grow. The sophistication and complexity of these attacks continue to evolve. More than ever organizations need to plan, prepare, and defend against a potential cyber incident. Security Operation Centers (SOCs) act as an organization's front-line defense against cyber incidents. SOC analyst accomplishes this by monitoring and … [Read more...] about In the Trenches: Security Operations Center