

Our Courses

Cloud Application Security
After completing the course, the student should be able to do the following: ● List and describe the OWASP Top 10 vulnerabilities. ● Identify methods to provide cloud security assurance as part of the development life cycle, e.g.
-
Course by
-
Self Paced
-
6 hours
-
English

Protecting Cloud Architecture with Alibaba Cloud
Course Description The Security Exam Preparation Course is a series of online courses covering topics including Linux and Windows OS basics and operations, network fundamentals, host security, application security, network security, and data security.
-
Course by
-
Self Paced
-
12 hours
-
English

Building No-Code Apps with AppSheet: Implementation
This course teaches you how to implement various capabilities that include data organization and management, application security, actions and integrations in your app using AppSheet. The course also includes topics on managing and upgrading your app, improving performance and troubleshooting issues with your app.
-
Course by
-
Self Paced
-
13 hours
-
English

Cloud and Wireless Security
Course 6: Cloud and Wireless Security
-
Course by
-
Self Paced
-
6 hours
-
English

Google Workspace Security
Google Workspace Security is the third course in the Google Workspace Administration series. In this course you will focus on the various aspects of Google Workspace Security including user password policies and how to enable and enforce two step verification (2SV) for your users. You will learn about application security and understand how to whitelist and block API access to your account. You will see how Google Workspace can easily be integrated with a number of predefined 3rd party applications. You will also become familiar with the SSO options in Google Workspace.
-
Course by
-
Self Paced
-
5 hours
-
English

VEGA for Beginners: Scan for Web Vulnerabilities
This Guided Project 'VEGA for Beginners: Scan for Web Vulnerabilities' is for web developers, security professionals, and anyone who is interested in learning about web application security testing.
-
Course by
-
Self Paced
-
3 hours
-
English

Web Application Security Testing with OWASP ZAP
By the end of this project, you will learn the fundamentals of how to use OWASP Zed Attack Proxy (ZAP). This tool greatly aids security professionals and penetration testers to discover vulnerabilities within web applications. You will learn how to perform a basic web app vulnerability scan, analyze the results, and generate a report of those results. This course includes steps on how to configure the browser proxy to passively scan web requests and responses by simply exploring websites.
-
Course by
-
Self Paced
-
2 hours
-
English

Exploiting and Securing Vulnerabilities in Java Applications
In this course, we will wear many hats. With our Attacker Hats on, we will exploit Injection issues that allow us to steal data, exploit Cross Site Scripting issues to compromise a users browser, break authentication to gain access to data and functionality reserved for the ‘Admins’, and even exploit vulnerable components to run our code on a remote server and access some secrets. We will also wear Defender Hats. We will dive deep in the code to fix the root cause of these issues and discuss various mitigation strategies.
-
Course by
-
Self Paced
-
24 hours
-
English

Check Point Jump Start - CloudGuard Workload Protection
The purpose of this program is to give you an insight into the security challenges involving workload protection and application security in the cloud, and Check Point’s solutions for those challenges.
-
Course by
-
Self Paced
-
English

Check Point Jump Start: CloudGuard Workload Protection and Application Security
The purpose of this program is to give you an insight into the security challenges involving workload protection and application security in the cloud, and Check Point’s solutions for those challenges. The program will also enable you to perform a basic deployment and configuration of the various solutions under the CloudGuard umbrella.
-
Course by
-
Self Paced
-
English

Systems and Application Security
Course 7 - Systems and Application Security This is the seventh course under the specialization SSCP. This course discusses two major changes in recent years to how we use our data: going mobile and using the cloud. First, we use our data on the go by means of data services provided to our mobile phones, Wi-Fi, and other devices.
-
Course by
-
Self Paced
-
17 hours
-
English

Securing Software, Data and End Points
Course 4: Securing Software, Data and End Points
-
Course by
-
Self Paced
-
8 hours
-
English

IBM Applied DevOps Engineering
Gain the in-demand skills to advance from programming to DevOps engineering. In this program, you’ll learn the latest DevOps practices, tools, and technologies from experts at IBM to get job-ready in less than 3 months. Almost every company is looking to become more Agile and shorten software development cycles, creating a high demand for DevOps Engineers!
-
Course by
-
Self Paced
-
English

IBM Back-End Development
Prepare for a career in the high-growth field of software development.
-
Course by
-
Self Paced
-
English

IBM Full Stack Software Developer
Prepare for a career in the high-growth field of software development. In this program, you’ll learn in-demand skills and tools for front-end, back-end, and cloud native application development to get job-ready in less than 4 months. Full stack refers to the end-to-end computer system application, including the front end and back end coding. Cloud native development refers to developing a program designed to work on cloud architecture. The flexibility and adaptability that full stack and cloud native developers provide make them highly sought after in this digital world.
-
Course by
-
Self Paced
-
English

Google Professional Workspace Administrator
This specialization has been developed to help administrators master the foundations of establishing and managing Google Workspace for their organization. You will set up a new Google Workspace account, and explore provisioning options. You will learn how to manage users and become familiar with organizational structures and Google Workspace core services. You will learn how to configure these services to meet your own organizational needs. You will be introduced to the best practices to protect your users and data.
-
Course by
-
Self Paced
-
English

Cyber Threat Intelligence
This course gives you the background needed to gain Cybersecurity skills as part of the Cybersecurity Security Analyst Professional Certificate program. \n\nYou will understand network defensive tactics, define network access control and use network monitoring tools. You will understand data protection risks and explore mobile endpoint protection.
-
Course by
-
Self Paced
-
25 hours
-
English