scorecardresearch
Naukri Learning > application security

Refine Results

Course Level

Mode of learning

Category

IT & Telecom

Banking, Finance & Analytics

Executive Programs

Design

BPO, Operations & Engineering

Masters Courses & MBA

Human Resources & Administration

Marketing

Others

Leadership & Management

"application security" courses, certification and training

  1. Certified Cloud Security Professional

    Cloud computing is for understanding cloud security, cloud system management and mitigation strategies. The course scouts aspects of cloud computing architectural design, cloud components, computing characteristics and cloud deployment models. Applicants will also learn problems relating to the management and protection of data assets held on cloud platform. Other topics covered in the course are auditing, legislative impact, ownership, data rights management, threat mitigation and so on. It is designed for information security professionals with three years of information security experience. A globally recognized certification in cloud security, It is perfect for those whose day to day responsibilities include managing cloud environments.

    13 HoursOnline self studyIntermediate
    $ 144 Take this Course

    Cloud Computing, Information Security, , Operations management

    Offered by:  Skillsoft
  2. Vskills Certified Software Security Professional

    Vskills certification for Software Security Professional assesses the candidate for a company’s secured software development needs. The certification tests the candidates on various areas in software security which includes knowledge of various types of security attacks and countermeasures on programming language (C/C++, Java and .Net), web applications, web services, SOA-based application, and mobile applications and tools used.

    12 hoursOnline self studyBeginner
    ₹ 4,129 Take this Course

    Digital, Safety

    Offered by:  VSkills
  3. Systems Security Certified Practitioner (SSCP)

    The perfect credential for those who have proven technical skills and expertise in hands-on operational IT positions. It is a globally recognized certification offering the ability to monitor, implement and administer IT infrastructure according to information security policies and procedure that make sure integrity, confidentiality and data availability. In the course, you will learn about main activities like risk management process, risk treatment and maintaining monitoring systems. In addition to this, it covers how to test and analyze malicious activity encompassing malicious code and countermeasures. In the end, you will come across best practices for securing big data systems and virtual environments like attack countermeasures and appliance.

    9 HoursOnline self studyIntermediate
    $ 184 Take this Course

    Big Data, Information Security,

    Offered by:  Skillsoft
  4. Vskills Certified Network Security Professional

    Vskills certification for Network Security Professional assesses the candidate for a company’s network security needs. The certification tests the candidates on various areas in network security which includes knowledge of networking, cryptography, implementation and management of network security measures.

    22 hoursOnline self studyBeginner
    ₹ 4,129 Take this Course

    Network Security, Cloud Computing

    Offered by:  VSkills
  5. Ethical Hacking Ultimate Course

    This course starts from the very beginning, making it a great resource for newbies who are just starting out in Penetration Testing or cyber security individuals that will definitely benefit from it. Intermediate and advanced hackers can also use this course as a refresher. | This comprehensive course will cover all aspects of Ethical Hacking as well as integration with Kali Linux. However, this isn’t just a normal theory based courses, but it is an extremely hands-on course, so you will not only read the fundamentals, but you will actually get to work with them using projects! Learning and getting hands-on on Ethical Hacking and Penetration Testing will opens many doors for your career. There are lot of career opportunities in Cyber Security Industry, and there is stunning and amazing opportunities coming in as IoT is becoming tomorrows future.

    Online self studyIntermediate
    $ 50 Take this Course

    Ethical Hacking, Cyber Security, IOT,

    Offered by:  Eduonix
  6. Advanced AngularJS

    AngularJS is designed to facilitate the development of rich, robust, single-page web applications. Being a client-side framework, AngularJS applications are inherently public and reveal much more implementation detail to the end user than traditional web sites. Securing an AngularJS application is a combination of using best practices on the client side to reduce vulnerability, and knowing that the lion share of security comes from making sure our server is locked down. This course covers concepts involved in securing full stack web applications using AngularJS, from Authentication and Authorization strategies, to the built-in security features AngularJS ships with. AngularJS is designed to facilitate the development of rich, robust, single-page web applications. This course will teach you how to get started building AngularJS applications with using TypeScript. This course will teach you about working with some of the categories of AngularUI, a companion framework to AngularJS, those being AngularUI Bootstrap, NG-Grid, UI-Alias, UI-Select, routing with UI-Router, two categories of AngularUI, a companion framework to AngularJS, those being AngularUI Utilities and AngularUI Modules and working with AngularJS application data in a client browser, by covering concepts such as offline detection and availability, caching, storing data in the client, and creating data models.

    9 HoursOnline self studyIntermediate
    $ 137 Take this Course

    Offered by:  Skillsoft
  7. PG Diploma In Advanced Computing (PG-DAC)

    The Post Graduate Diploma in Advanced Computing (PG-DAC) is the flagship programme of ACTS. The course is targeted towards engineers and IT professionals who wish to venture into the domain of advanced computing. The course aims to groom the students to enable them to work on current technology scenarios as well as prepare them to keep pace with the changing face of technology and the requirements of the growing IT industry. The course curriculum has been designed keeping in view the emerging trends in advanced computing as well as contemporary and futuristic human resource requirements of the ICT industry. The entire course syllabus, course ware, teaching methodology and the course delivery have been derived from the rich research and development background of C-DAC. The depth and width of the course is unique in the industry covering a wide spectrum of requirements of the ICT industry. Running successfully for more than seventeen years, the PG-DAC course has yielded more than quarter million of students, who are well positioned in the industry today.

    Brochure
    Offered by:  CDAC
  8. PG Diploma in IT Infrastructure, Systems and Security (PG-DITISS)

    The theoretical and practical mix of the Post Graduate Diploma in IT Infrastructure Systems and Security (PG-DITISS) programme has the following focus: | To explore the fundamental concepts of Cyber Security | To develop in-depth knowledge and understanding of the Intrusion Detection and Prevention domain. | To learn to analyze the threats detection techniques. | To understand the Concepts of Data Centre Management. | To learn & use various techniques for Ethical Hacking and Cyber Forensics. | To understand the applications security implementation. | To analyze and solve problems conceptually and practically from diverse industries, such as government manufacturing, retail, education, banking/ finance, healthcare and pharmaceutical. | To undertake industrial research projects for the development of future solutions in the domain of Information Security to make an impact in the technological advancement.

    5 Students
    Brochure
    Offered by:  CDAC
  9. Certified Internet Security Auditor (CISA)

    The Certified Information Systems Auditor (CISA) credential demonstrates that the individual possesses a firm understanding of IS audit, control and security skills as set out in the five domains that the Information Systems Audit and Control Association (ISACA)group has created. The CISA credential it recognized worldwide as a high-level certification of proficiency in IS auditing. This learning path will aid learners to prepare for the Certified Information Systems Auditor (CISA) examination.

    29 HoursOnline self studyIntermediate
    $ 283 Take this Course

    CISA, , Digital, project management, Information Security, Productivity

    Offered by:  Skillsoft
  10. Certified Secure Software Lifecycle Professional (CSSLP)

    The course discovers functional requirements like role and user definitions, deployment environment on requirements and timing requirements. It also includes key security goals which are important to secure software development. Participants will also learn secure software design process like threat modelling, surface evaluation, control identification and prioritization. Besides this, they will be introduced to design consideration to address main security concepts and interconnectivity. Some necessary techniques like peer-based code reviews, anti-tampering techniques and versioning will also be covered. In the end, the course encompasses the best practices for securing ordinarily used structural design and technologies like database, programming and virtualization.

    11.5 HoursOnline self studyBeginner
    $ 164 Take this Course

    Virtualization,

    Offered by:  Skillsoft
  11. Oracle Database 11g: Security

    Oracle Database is an object-relational database management system produced and marketed by Oracle Corporation. With the objective that every business should identify security threats and concerns and develop policies to protect itself, Oracle Database 11g: Security course aims at providing the candidates with detailed learning modules that will train them on standard security practices related to maintaining integrity of, protecting and controlling data. Database professionals can enhance their skills on how to configure Oracle Database 11g in a secure manner through this course. It also offers comprehensive training on a wide array of topics related to Oracle Database security like proxy authentication, database encryption, Oracle Label Security, Data Masking Pack, Firewalls, SQL*Plus Security, and other related areas. The prerequisite for this course is that learner should have working experience with Oracle Database 11g or have taken the Oracle Database 11g: Administration I and Oracle Database 11g: Administration Workshop II courses.

    17.5 HoursOnline self studyIntermediate
    $ 145 Take this Course

    Offered by:  Skillsoft
  12. Certified Information Systems Security Professional (CISSP) - Online Self Paced

    Certified Information Systems Security Professional (CISSP) is an information security certification that was developed by the International Information System Security Certification Consortium, also known as (ISC)2. This CISSP course was prepared by professional experts and has carefully-designed modules that offer comprehensive learning content covering all the topics that will help candidates in the preparation for the CISSP exam. Offering unlimited online content access for six months, the course will help candidates gain expertise in areas like security principles, security engineering, asset management and network security as per an organisation’s requirements.

    20 HoursOnline self studyIntermediate
    $ 251 Take this Course

    cissp, Information Security, Network Security,

    Offered by:  Skillsoft
  13. Internet of Things Security Expert

    Internet of Things Security Expert is a 360° training program for professionals who seek to deepen their knowledge in the field of Internet of Things. The program is customised based on comprehensive knowledge about various IoT Security platforms. This program is designed by the industry experts to provide hands-on training with tools that are used to speed up the training process. | The program is inclusive of full-fledged training, starting from Python, advanced IoT training, to IoT security, all of which are found to be essential for IoT Security Experts. These modules put together will provide a solid foundation and give a further edge in the learning process. | Take 360° Master’s Program training in IoT Security Expert to | Gain expert level knowledge to build, test and deploy applications using Python. Learn suitability of python to use it to write device, gateway and cloud based applications and scripts. | Gain advance level knowledge to architect, build and implement IoT projects from selection of right components to securing the ecosystem using relevant tools and technologies. | Build a security plan, extend security to peripheries, and gain familiarity with fundamental cryptographic algorithms need to safeguard IoT systems.

    120 HoursOnline ClassroomIntermediate
    ₹ 53,100 Enquire Now

    Internet of Things, IOT, Digital, Big Data, Cloud Computing, Machine Learning,

    Offered by:  Cognixia
  14. Certified Information Security Manager (CISM)

    Certified Information Security Manager (CISM) is a certification for information security managers awarded by ISACA, an international professional association focused on IT Governance. This CISM course has been designed specifically to offer candidates the best-in-the-industry training to play the role of an information security manager | Aimed at providing the requisite learning path for those preparing for the CISM certification, the course offers high-quality online learning content and study materials | The course covers a wide range of topics related to information security like security governance, risk management, compliance, program development and management, and incident management | Providing a career boost, the course follows the 2015 ISACA Candidate Information Guide and candidates will get a course completion certificate

    Offered by:  Skillsoft
  15. Intro to Information Security

    This course provides a one-semester overview of information security. It is designed to help students with prior computer and programming knowledge — both undergraduate and graduate — understand this important priority in society today. The technical content of the course gives a broad overview of essential concepts and methods for providing and evaluating security in information processing systems (operating systems and applications, networks, protocols, and so on). | In addition to its technical content, the course touches on the importance of management and administration, the place information security holds in overall business risk, social issues such as individual privacy, and the role of public policy.

    Online self studyIntermediate
    Enquire Now

    Information Security,

    Offered by:  UDACITY
Show Courses in Table
CompareRemove All
Browse Category
0

Buy Safely with Naukri.com
We support secure payment methods

Disclaimer

While Naukri Learning services have helped many customers over the years, we do not guarantee any interview calls or assure any job offers with any of our services.
The services associated with Naukri Learning are only provided through the website Naukri.com. You are advised to be cautious of calls/emails asking for payment from other web sites that claim to offer similar services under the name of Naukri.com. We have no associates/agents other than the partner sites that have been specifically named on the homepage of the website Naukri.com. We also recommend that you Security Guidelines and Terms and Conditions