scorecardresearch
Naukri Learning > security

Refine Results

Course Level

Mode of learning

Category

IT & Telecom

Banking, Finance & Analytics

BPO, Operations & Engineering

Human Resources & Administration

Executive Programs

Masters Courses & MBA

Marketing

Others

Leadership & Management

Design

"security" courses, certification and training

  1. Certified Cloud Security Professional

    Cloud computing is for understanding cloud security, cloud system management and mitigation strategies. The course scouts aspects of cloud computing architectural design, cloud components, computing characteristics and cloud deployment models. Applicants will also learn problems relating to the management and protection of data assets held on cloud platform. Other topics covered in the course are auditing, legislative impact, ownership, data rights management, threat mitigation and so on. It is designed for information security professionals with three years of information security experience. A globally recognized certification in cloud security, It is perfect for those whose day to day responsibilities include managing cloud environments.

    Offered by:  Skillsoft
  2. Certified Information Systems Security Professional (CISSP) - Online Self Paced

    Certified Information Systems Security Professional (CISSP) is an information security certification that was developed by the International Information System Security Certification Consortium, also known as (ISC)2. This CISSP course was prepared by professional experts and has carefully-designed modules that offer comprehensive learning content covering all the topics that will help candidates in the preparation for the CISSP exam. Offering unlimited online content access for six months, the course will help candidates gain expertise in areas like security principles, security engineering, asset management and network security as per an organisation’s requirements.

    Offered by:  Skillsoft
  3. Systems Security Certified Practitioner (SSCP)

    The perfect credential for those who have proven technical skills and expertise in hands-on operational IT positions. It is a globally recognized certification offering the ability to monitor, implement and administer IT infrastructure according to information security policies and procedure that make sure integrity, confidentiality and data availability. In the course, you will learn about main activities like risk management process, risk treatment and maintaining monitoring systems. In addition to this, it covers how to test and analyze malicious activity encompassing malicious code and countermeasures. In the end, you will come across best practices for securing big data systems and virtual environments like attack countermeasures and appliance.

    9 HoursOnline self studyIntermediate
    $ 184 Take this Course

    Big Data, Information Security, Administration, Operations

    Offered by:  Skillsoft
  4. Certified Information Security Manager (CISM)

    Certified Information Security Manager (CISM) is a certification for information security managers awarded by ISACA, an international professional association focused on IT Governance. This CISM course has been designed specifically to offer candidates the best-in-the-industry training to play the role of an information security manager | Aimed at providing the requisite learning path for those preparing for the CISM certification, the course offers high-quality online learning content and study materials | The course covers a wide range of topics related to information security like security governance, risk management, compliance, program development and management, and incident management | Providing a career boost, the course follows the 2015 ISACA Candidate Information Guide and candidates will get a course completion certificate

    Offered by:  Skillsoft
  5. Vskills Certified Software Security Professional

    Vskills certification for Software Security Professional assesses the candidate for a company’s secured software development needs. The certification tests the candidates on various areas in software security which includes knowledge of various types of security attacks and countermeasures on programming language (C/C++, Java and .Net), web applications, web services, SOA-based application, and mobile applications and tools used.

    12 hoursOnline self studyBeginner
    ₹ 4,129 Take this Course

    Software development, Digital, Safety

    Offered by:  VSkills
  6. Certified Information Systems Security Professional (CISSP)

    The CISSP certification was the first credential in the field of information security, accredited by the ANSI (American National Standards Institute) to ISO (International Standards Organization) Standard 17024:2003. It is approved by the U.S. Department of Defense (DoD) in both their Information Assurance Technical (IAT) and Managerial (IAM) categories.

    10000 Students
    Offered by:  Koeing Solutions
  7. The Complete Cyber Security Course : Anonymous Browsing!

    Learn a practical skill-set in staying anonymous online and maintaining total privacy against even a well-resourced adversary with global influence. Covering all major platforms including Windows, MacOS, Linux. iOS and Android . Plus Tails, Whonix, and others. Become a cyber security specialist. - Go from beginner to expert in this easy to follow advanced course. We cover in detail all the best anonymising and privacy methods . Including; Tor, VPNs - Virtual Private Networks, Proxy servers - HTTP, HTTPS, SOCKs and WebSSH, Secure Shell, Live Operating Systems - Tails, Knoppix, Puppy Linux, Jondo live, Tiny Core Linux OPSEC - Operation Security I2P - The Invisible Internet Project JonDoNym Off-site connections - Hotspots and Cafes Mobile, Cell Phones & Cellular NetworksBulletproof hosting and more.... For each of these anonymizing methods we analysis in detail their strengths and weaknesses , we look at the techniques used to attack these anonymity services and what you can do to mitigate those de-anonymization attack s . Advanced anonymity : We explore chaining and nesting anonymizing services together to provide layers of obfuscation for maximum anonymity against even the most well-resourced adversaries. We cover bypassing censors, firewalls, and proxies . Learn to bypass the trickiest of censoring devices including DPI (deep packet inspection). The course covers both the theory and practically how setup everything we discuss. This is volume 3 of 4 of your complete guide to cyber security privacy and anonymity.

    Online self studyIntermediate
    Enquire Now

    Cyber Security,

    Offered by:  UDEMY
  8. The Complete Cyber Security Course : Network Security!

    Become a cyber security specialist. After this course, you will be able to discover security vulnerabilities across an entire network, by using network hacking techniques and vulnerability scanning . You will be able to architect your network for maximum security and prevent local and remote attacks. We also cover the use of custom router firmware to provide you with better network security services. You will understand the various types of firewalls that are available and what threats each help mitigate. Including layer 4 firewalls like Iptables on Linux and PF on MacOS and BSD. Virtual firewalls, host-based firewalls and application based firewalls like Pfsence. We cover firewalls on all platforms including Windows, Mac OS X and Linux for all types of use scenarios. We explore in detail wireless security, the configurations that are required for maximum security and why. How Wi-Fi is hacked and how to mitigate those attacks. Covering everything from encryption weaknesses to evil twins, RF isolation, and Wi-Fi crackers. You will master network monitoring to discover and identify potential hackers , malware and other adversaries that might be lurking on your network. Using tools like Wireshark , Tcpdump and Syslog. We then move away from network security and onto the details of how we are tracked online by corporations, nation-states your ISP and others. You will understand the techniques used like zombie super cookies, browser fingerprinting and how browser profiling works so third parties can establish who you are online. We look at search engine privacy - and how to mitigate the tracking and privacy issues of search engines and their associated services. Browser security - We cover one of the largest risks online, the browser. The doorway into your system. How to best reduce the attack surface of the browser and harden it for maximum security and privacy. A critical consideration for reducing your risk. Finally you will fully understand how to best use methods of authentication including passwords and multi-factor authentication - soft tokens and hard tokens . The best password managers to use and why. How passwords are cracked, and how to mitigate the cracking. This is volume 2 of 4 of your complete guide to cyber security privacy and anonymity.

    Online self studyIntermediate
    Enquire Now

    Cyber Security, Network Security, IOT,

    Offered by:  UDEMY
  9. IINS 2.0: Implementing Cisco IOS Network Security

    Designed to be as efficient as classroom training, Cisco IOS Network Security makes it significant for business to focus on the security of the networks. It is also challenging due to increased availability requirements and regulatory requirements. While organizations move their business to the public sector, they have to make certain that the data doesn’t come in front of wrong individuals. The course covers the development of a comprehensive security and different phases of the process and significance of a sound security policy.

    19.5 HoursOnline self studyIntermediate
    $ 283 Take this Course

    Network Security,

    Offered by:  Skillsoft
  10. Certified Internet Security Auditor (CISA)

    The Certified Information Systems Auditor (CISA) credential demonstrates that the individual possesses a firm understanding of IS audit, control and security skills as set out in the five domains that the Information Systems Audit and Control Association (ISACA)group has created. The CISA credential it recognized worldwide as a high-level certification of proficiency in IS auditing. This learning path will aid learners to prepare for the Certified Information Systems Auditor (CISA) examination.

    Offered by:  Skillsoft
  11. Vskills Certified Network Security Professional

    Vskills certification for Network Security Professional assesses the candidate for a company’s network security needs. The certification tests the candidates on various areas in network security which includes knowledge of networking, cryptography, implementation and management of network security measures.

    22 hoursOnline self studyBeginner
    ₹ 4,129 Take this Course

    Network Security, Cloud Computing, Law

    Offered by:  VSkills
  12. The Complete Cyber Security Course : Anonymous Browsing

    Learn a practical skill-set in staying anonymous online and maintaining total privacy against even a well-resourced adversary with global influence. | Covering all major platforms including Windows, MacOS, Linux. iOS and Android. Plus Tails, Whonix, and others.

    14 hoursOnline self studyIntermediate
    Enquire Now

    Offered by:  UDEMY
  13. MTA IT Infrastructure - Security Fundamentals

    Microsoft Technology Associate (MTA) is a suite of technology certification exams that validate a candidate’s fundamental knowledge needed to build a career using Microsoft technologies.| This Security Fundamentals course has been specifically designed to provide the best-in-the-industry training to the candidates on some of the main core concepts in IT security — confidentiality, integrity, and availability | Designed by expert professionals, this course has high quality online learning content and study materials | The course covers various areas like security layers, operating system security, network security, and security software | Aligned with the MTA: Security exam, the course offers a certification upon completion

    5.5 HoursOnline self studyIntermediate
    $ 101 Take this Course

    Network Security

    Offered by:  Skillsoft
  14. IT Security: Defense against the digital dark arts

    This course covers a wide variety of IT security concepts, tools, and best practices. It introduces threats and attacks and the many ways they can show up. We’ll give you some background of encryption algorithms and how they’re used to safeguard data. Then, we’ll dive into the three As of information security: authentication, authorization, and accounting. We’ll also cover network security solutions, ranging from firewalls to Wifi encryption options. Finally, we’ll go through a case study, where we examine the security model of Chrome OS. The course is rounded out by putting all these elements together into a multi-layered, in-depth security architecture, followed by recommendations on how to integrate a culture of security into your organization or team.

    20 hoursOnline self studyBeginner
    ₹ 3,516 Enquire Now

    Information Security, Network Security, Accounting,

    Offered by:  Coursera
  15. Information Security: Context and Introduction

    In this course you will explore information security through some introductory material and gain an appreciation of the scope and context around the subject. This includes a brief introduction to cryptography, security management and network and computer security that allows you to begin the journey into the study of information security and develop your appreciation of some key information security concepts. The course concludes with a discussion around a simple model of the information security industry and explores skills, knowledge and roles so that you can determine and analyse potential career opportunities in this developing profession and consider how you may need to develop personally to attain your career goals.

    14 hoursOnline self studyBeginner
    ₹ 3,516 Enquire Now

    Information Security, Network Security, Cyber Security,

    Offered by:  Coursera
Show Courses in Table
CompareRemove All
Browse Category
0

Buy Safely with Naukri.com
We support secure payment methods

Disclaimer

While Naukri Learning services have helped many customers over the years, we do not guarantee any interview calls or assure any job offers with any of our services.
The services associated with Naukri Learning are only provided through the website Naukri.com. You are advised to be cautious of calls/emails asking for payment from other web sites that claim to offer similar services under the name of Naukri.com. We have no associates/agents other than the partner sites that have been specifically named on the homepage of the website Naukri.com. We also recommend that you Security Guidelines and Terms and Conditions