This course covers data security and encryption. Learn about cryptographic applications, from basic to advanced solutions for protecting information. Understand public key infrastructure (PKI), essential for secure digital communication and establishing trust. Navigate secure protocols and make informed decisions to protect data integrity. Understand symmetric and asymmetric … [Read more...] about (SSCP) Systems Security Certified Practitioner: Unit 2
Security
Cybersecurity Metrics, Vendors & Risks
Sponsored by 1PASSWORD and MICROSOFT. No matter where you are in your career, gain direction and elevate your trajectory with AWIT. Learn how to succeed from working with security leaders, to being appointed CISO yourself. Featuring: * STEVE ZALEWSKI, former CISO, Levi Strauss * NANCY WANG, founder and CEO, AWIT; SVP, Head of Engineering at 1Password; Venture Partner at … [Read more...] about Cybersecurity Metrics, Vendors & Risks
Certified Kubernetes Security Specialist (CKS): Unit 1
This course breaks down the CKS certification process, clarifying exam requirements and helping you create an effective study plan. You’ll set up and manage your own Kubernetes home lab, both locally and in the cloud, to practice real-world scenarios. Key topics include Kubernetes security fundamentals, cloud-native application protection, threat modeling, and an overview of … [Read more...] about Certified Kubernetes Security Specialist (CKS): Unit 1
Information Security Foundations
Step confidently into one of today's most in-demand career paths with Information Security Foundations—a course designed to transform beginners into capable, career-ready cybersecurity professionals. You'll learn the most critical aspects of business security—Confidentiality, Integrity, and Availability—as well as new defenses such as Cryptography, Blockchain, Public Key … [Read more...] about Information Security Foundations
Cybersecurity Threats and Defense
In today’s digital world, every click, every login, and every transaction is a target. This CompTIA Cybersecurity Threats and Defense course will help you turning into a confident defender against the most common digital threats. Through real-world examples and structured modules, you’ll master the spectrum of modern attacks—malware, network exploitation, cryptographic … [Read more...] about Cybersecurity Threats and Defense