Hardware Security

Unfortunately Coursera (CC)'s trainings are no longer available on Springest

check_box_outline_blank

CISSP | Certified Information Systems Security Professional | 2024 Version (e-learning)

Logo DutchTrain
|META_INFO|

Certified Information Systems Security Professional | CISSP | Version 2024 Whether you are a security professional, a seasoned engineer, or…

check_box_outline_blank

Class 11 Physics (India): Carnot efficiency 3: Proving that it is the most efficient

Logo Khan Academy
|META_INFO|

Proving that a Carnot Engine is the most efficient engine Class 11 Physics (India) Let's learn, practice, and master topics of class 11 phy…

check_box_outline_blank

Intermediate Endpoint Security

Logo IT-Learning
|META_INFO|

In this course, learn about the importance of endpoint security. The course covers the fundamentals of protecting hardware assets, operatin…

check_box_outline_blank

Course 3593: Designing a Microsoft SQL Server 2005 Database Server Infrastructure

Logo Microsoft Learning
|META_INFO|

Introduction In this online learning course you will evaluate the existing database server infrastructure of an organization and gather the…

check_box_outline_blank

CompTIA Security+ (SY0-701) Cert Prep: 4 Security Operations

Logo IT-Learning
|META_INFO|

In this course, security and information technology expert Mike Chapple guides you through security operations principles to help you prepa…

check_box_outline_blank

Course 3314: Designing Security Policies for Microsoft SQL Server 2005 Instances and Databases

Logo Microsoft Learning
|META_INFO|

Introduction In this course, you design SQL Server instance-level, database-level, and object-level security policies. You also learn the s…

check_box_outline_blank

Cybersecurity Soft Skills with the STS Model by Infosec

Logo IT-Learning
|META_INFO|

In this course, obtain applicable cybersecurity soft skills knowledge guided by the STS (security, trust, and stability) model. This will e…

check_box_outline_blank

Course 3176: Designing a Security Strategy for a Microsoft SQL Server 2005 Database Solution

Logo Microsoft Learning
|META_INFO|

Introduction In this 2 hour course you will learn how to plan for security during the design phase including designing a security strategy …

check_box_outline_blank

Solaris 10 Security - Self-Study Course

Logo Oracle University
|META_INFO|

The Solaris 10 Security course provides students with instruction about identifying authentication and security changes found in Solaris 10…

check_box_outline_blank

Managing and Maintaining Windows 8 (exam 70-688)

Logo OnlineITcourses.com
|META_INFO|

In this training course you will learn as a system administrator to manage and maintain Windows 8 clients. You will also learn to support e…