scorecardresearch
Naukri Learning > security engineer

Refine Results

Course Level

Mode of learning

Category

IT & Telecom

Banking, Finance & Analytics

BPO, Operations & Engineering

Executive Programs

Design

Masters Courses & MBA

Others

Human Resources & Administration

Marketing

Leadership & Management

"security engineer" courses, certification and training

  1. Vskills Certified Snort Professional Government Certification

    Snort is the industry-leading open source intrusion prevention application. This Vskills Certified Snort Professional course assesses the candidate’s skills on a wide range of criteria that encompasses all the necessary open source components and the successful management and implementation of the technology. It is a government-certified course which ensures that the candidates are given the right training so that they stand up to the competition in the job market and get employment opportunities in various companies.

    100 hoursOffline self studyIntermediate
    $ 121 Take this Course

    Data Analysis

    Course Selling Partner
  2. Network Security

    The summary for this course comes from the course web site at Georgia Tech. Note that watching this course on Udacity does not count for Georgia Tech credit unless you are enrolled in the Georgia Tech OMSCS program. | This course provides an introduction to computer and network security. Students successfully completing this class will be able to evaluate works in academic and commercial security, and will have rudimentary skills in security research. The course begins with a tutorial of the basic elements of cryptography, cryptanalysis, and systems security, and continues by covering a number of seminal papers and monographs in a wide range of security areas.

    Online self studyIntermediate
    Enquire Now

    Network Security

  3. Certified Internet Security Auditor (CISA)

    The Certified Information Systems Auditor (CISA) credential demonstrates that the individual possesses a firm understanding of IS audit, control and security skills as set out in the five domains that the Information Systems Audit and Control Association (ISACA)group has created. The CISA credential it recognized worldwide as a high-level certification of proficiency in IS auditing. This learning path will aid learners to prepare for the Certified Information Systems Auditor (CISA) examination.

    Course Selling Partner
  4. Big Data Engineering Perspectives

    Big data is a term for data sets so large that traditional data processing applications can not be used to perform any sort of analysis. It is often semi structured or unstructured in form. There are a number of unique challenges that arise when companies begin to use big data. The least of which are the engineering concerns. This course will introduce some of those engineering challenges and describe how some companies have come up with solutions.

    1.1 HoursOnline self studyIntermediate
    $ 65 Take this Course

    Big Data, , Data Visualization

    Course Selling Partner
  5. PG Certificate in Information and Cyber Security

    N L Dalmia Institute of Management Studies & Research offers the first of it’s kind in India –6 months post-graduation certificate in Information and Cyber Security | The course divided into three stages, gives the students a unique opportunity to develop their careers in ethical hacking and cyber security. The course is a perfect fit for students with a strong engineering/sciences background in computer sciences and information technology. The course would holistically cover everything right from the basics of penetration testing to cyber laws.

    Brochure Course Provider
  6. Piping Engineering

    Piping Engineering course is one-of-a-kind. This course is structured to raise the level of expertise in piping design and to improve the competitiveness in the global markets. This course provides various piping system designs, development skills and knowledge of current trends of plant layout. The students are given case studies to develop their professional approach

    ClassroomIntermediate
    Enquire Now

    Brochure Course Provider
  7. Internet of Things Security Expert

    Internet of Things Security Expert is a 360° training program for professionals who seek to deepen their knowledge in the field of Internet of Things. The program is customised based on comprehensive knowledge about various IoT Security platforms. This program is designed by the industry experts to provide hands-on training with tools that are used to speed up the training process. | The program is inclusive of full-fledged training, starting from Python, advanced IoT training, to IoT security, all of which are found to be essential for IoT Security Experts. These modules put together will provide a solid foundation and give a further edge in the learning process. | Take 360° Master’s Program training in IoT Security Expert to | Gain expert level knowledge to build, test and deploy applications using Python. Learn suitability of python to use it to write device, gateway and cloud based applications and scripts. | Gain advance level knowledge to architect, build and implement IoT projects from selection of right components to securing the ecosystem using relevant tools and technologies. | Build a security plan, extend security to peripheries, and gain familiarity with fundamental cryptographic algorithms need to safeguard IoT systems.

    120 HoursOnline ClassroomIntermediate
    ₹ 53,100 Enquire Now

    Internet of Things, IOT, Digital, Big Data, Cloud Computing, Machine Learning, , Languages, Operations

    Course Selling Partner
  8. Oracle Database 11g: Security

    Oracle Database is an object-relational database management system produced and marketed by Oracle Corporation. With the objective that every business should identify security threats and concerns and develop policies to protect itself, Oracle Database 11g: Security course aims at providing the candidates with detailed learning modules that will train them on standard security practices related to maintaining integrity of, protecting and controlling data. Database professionals can enhance their skills on how to configure Oracle Database 11g in a secure manner through this course. It also offers comprehensive training on a wide array of topics related to Oracle Database security like proxy authentication, database encryption, Oracle Label Security, Data Masking Pack, Firewalls, SQL*Plus Security, and other related areas. The prerequisite for this course is that learner should have working experience with Oracle Database 11g or have taken the Oracle Database 11g: Administration I and Oracle Database 11g: Administration Workshop II courses.

    17.5 HoursOnline self studyIntermediate
    $ 145 Take this Course

    Administration,

    Course Selling Partner
  9. Information Security

    This course on information security establishes concepts of protecting data information assets without getting affected by the way information is formatted, processed, transmitted or stored. The program also involves modules on preventing unauthorized access, modification or destruction of data. The course fee includes INR 300 as courier charges for the study material.

    Course Selling Partner
  10. MTA IT Infrastructure - Security Fundamentals

    Microsoft Technology Associate (MTA) is a suite of technology certification exams that validate a candidate’s fundamental knowledge needed to build a career using Microsoft technologies.| This Security Fundamentals course has been specifically designed to provide the best-in-the-industry training to the candidates on some of the main core concepts in IT security — confidentiality, integrity, and availability | Designed by expert professionals, this course has high quality online learning content and study materials | The course covers various areas like security layers, operating system security, network security, and security software | Aligned with the MTA: Security exam, the course offers a certification upon completion

    5.5 HoursOnline self studyIntermediate
    $ 101 Take this Course

    Network Security,

    Course Selling Partner
  11. Security Operations

    How do businesses handle cyber attacks? What value does a security operations centre give to an organisation? Discover the answers to these questions on this course. You will have the opportunity to gain a deeper understanding of the processes of a SOC and how it’s operated by staff. You will also consider how it fits in within the rest of the business.

    Online self studyIntermediate
    Enquire Now

    Operations, Cyber Security

  12. Ethical Hacking Ultimate Course

    This course starts from the very beginning, making it a great resource for newbies who are just starting out in Penetration Testing or cyber security individuals that will definitely benefit from it. Intermediate and advanced hackers can also use this course as a refresher. | This comprehensive course will cover all aspects of Ethical Hacking as well as integration with Kali Linux. However, this isn’t just a normal theory based courses, but it is an extremely hands-on course, so you will not only read the fundamentals, but you will actually get to work with them using projects! Learning and getting hands-on on Ethical Hacking and Penetration Testing will opens many doors for your career. There are lot of career opportunities in Cyber Security Industry, and there is stunning and amazing opportunities coming in as IoT is becoming tomorrows future.

    Online self studyIntermediate
    $ 50 Take this Course

    Ethical Hacking, Cyber Security, IOT,

    Course Selling Partner
  13. IT Service Expert Program

    IT Service Expert Program is a certification course that would help you understand ITIL and how you can build specialized organisational capabilities to give superior services and deliver value to your customers. The Walt Disney Company, US Federal Government, IBM, WalMart and several other big businesses use ITIL. Understand how they have made the best use of ITIL and implement the principles to grow your organisation and yourself.

  14. Engineering Design

    Engineering Design is the process of devising a system, component, or process to meet desired needs. The course, Engineering Design, is specially made to teach the decision making process often iterative in which the basic sciences, mathematics, and engineering sciences are applied to convert resources optimally to meet a stated objective. The course is very beneficial for engineering and management professionals or students pursuing post graduation studies.

    Online self studyBeginner
    $ 248 Take this Course

    Engineering Design

    Course Selling Partner
  15. Post graduate Diploma in Financial Engineering and Risk Management 

    Post Graduate Diploma in Financial Engineering and Risk Management (PGDFERM) is a specific programme by National Institute of Securities Markets (NISM). The programme aims to equip the participants with skills in treasury and risk management functions. The course is a combination of basic and advanced theory and practical, and a combination of mathematics, statistics, financial economics, computational finance financial modelling and risk management. | The course will be offered in two different Formats - | Format A: Weekend programme at Vashi. | Format B: Residential programme at Vashi.

    ClassroomExpert
    ₹ 165,000 Enquire Now

    Financial modelling,

Show Courses in Table
CompareRemove All
Browse Category
0

Buy Safely with Naukri.com
We support secure payment methods

Disclaimer

While Naukri Learning services have helped many customers over the years, we do not guarantee any interview calls or assure any job offers with any of our services.
The services associated with Naukri Learning are only provided through the website Naukri.com. You are advised to be cautious of calls/emails asking for payment from other web sites that claim to offer similar services under the name of Naukri.com. We have no associates/agents other than the partner sites that have been specifically named on the homepage of the website Naukri.com. We also recommend that you Security Guidelines and Terms and Conditions