Securing Digital Democracy

Unfortunately Coursera (CC)'s trainings are no longer available on Springest

check_box_outline_blank

M40367 Security Fundamentals incl. Practice Labs | 98-367 | MTA (e-learning)

Logo DutchTrain
|META_INFO|

M40367 Security Fundamentals incl. Practice Labs | 98-367 This training helps you prepare for Microsoft Technology Associate Exam 98-367 an…

check_box_outline_blank

Power Platform Solution Architect | PL-600 | PL600

Logo DutchTrain
|META_INFO|

Power Platform Solution Architect | PL-600 The Solution Architect is responsible for the successful design, implementation, deployment and …

check_box_outline_blank

Course 10242: Securing Windows 7 Desktops

Logo Microsoft Learning
|META_INFO|

Introduction This two-hour course describes how to configure Windows 7 security management tools. The course covers the following topics: O…

check_box_outline_blank

Preparing for Elections and Civic Engagement

Logo IT-Learning
|META_INFO|

Voting is important! This course empowers US voters to understand the elections and civic engagement. Casting your ballot, whether at a pol…

check_box_outline_blank

Financial Analysis: Making Business Projections

Logo IT-Learning
|META_INFO|

Estimating future financial performance plays a big part in the life of start-ups and corporations large and small. By looking ahead, compa…

check_box_outline_blank

AI Automation with Anthropic Claude API's Agentic Computer Use

Logo IT-Learning
|META_INFO|

Discover the power of Anthropic Claude’s new computer use API, enabling AI to automate clicks, type, and navigate browsing tasks. This co…

check_box_outline_blank

Course 70019: Managing Computer Accounts and Implementing Group Policy

Logo Microsoft Learning
|META_INFO|

Introduction This 3.25-hour course describes how to manage computer accounts and implement Group Policy. Computers in a domain are security…

check_box_outline_blank

Strategies for Computer Security Incident Response Team (CSIRT)

Logo IT-Learning
|META_INFO|

In spite of all the options available on the market today, basic security hygiene is still one of the best ways to prevent a potentially de…

check_box_outline_blank

Incident Handling Process: Cybersecurity Labs Powered by Hack the Box

Logo IT-Learning
|META_INFO|

Learn how to manage security incidents from initial detection of suspicious activity through confirmation, containment, eradication, recove…

check_box_outline_blank

CSSLP Cert Prep: 8 Supply Chain and Software Acquisition

Logo IT-Learning
|META_INFO|

The Certified Secure Software Lifecycle Professional (CSSLP) is a globally recognized certification from (ISC)2, the organization that has …