Please download one of these browsers:
Keep your browser version up-to-date for a fast, secure, web experience.
This course will introduce the learner to the various bank products that s/he will encounter as a teller
Comprender y analizar en qué consiste una sociedad globalizada e interconectada
• Conocer el impacto que la publicidad tiene en la sociedad
Social media can be a fun and harmless tool, but there can be downsides when using it at work
Welcome to Excel VBA Programming–The Complete Guide, the most comprehensive VBA course! Visual Basic for Applications (VBA) is a powerful language built on top of popular Microsoft Office applications such as Excel, Access, and Outlook
Equips participants with the knowledge to not just react to threats but to anticipate and neutralize them before they result in harm
In this introductory course of this CISSP training series, you will learn about the (ISC)2 code of professional ethics and organizational code of ethics that all CISSP candidates must attest to in order to be certified
Logging and monitoring are crucial aspects of IT security governance
SIEM solutions serve as centralized data ingestion and analysis engines that seek out potential security issues
This course provides an in-depth exploration of telemarketing regulations, blending interactive content with real-world scenarios
Egal ob Vertriebler, Ingenieur, HR-Mitarbeiter, Vorstand oder Azubi … die Digitalisierung betrifft uns alle! Sie verändert Geschäftsgrundlagen ohne Rücksicht auf Organisationen und Prozesse, revolutioniert ganze Branchen und greift tief in unseren Alltag ein
Salespeople, engineers, HR team members, board members, trainees – digitisation affects us all! It changes the principles of doing business, with no consideration for standard procedures and processes, revolutionising entire industries and reaching deep into our everyday lives – at work and at home
In this video, you will discuss the importance of security programs and how to balance up-front costs with downtime in the long-run
After completing this video, you will be able to specify how new technology impacts security, and how to balance security with convenience
Upon completion of this video, you will be able to describe how employee training, awareness, and advocacy should be implemented and how it plays a crucial role in the protection of an organization's information
After completing this video, you will be able to explain data protection practices, devices and social media, and corporate security principles and programs
After completing this video, you will be able to describe the importance of password policies and why you should adhere to them
In this CompTIA Security+ SY0-601 course, you'll explore some advanced security concepts and build on some you may already know
Explore the basics of cloud computing, including deployment and service models, so you can better understand cloud computing attacks, as you prepare for the 312-50: Certified Ethical Hacker v10 exam
Continue to enhance your cryptography knowledge by exploring concepts like cryptanalysis, cryptology, and symmetric and asymmetric key management
Examine cryptography concepts such as cryptosystems, hashing algorithms, digital signatures and certificates, and key wrapping, as you prepare for the 312-50: Certified Ethical Hacker v10 exam
Increase your knowledge of IDS evasion using Snort by learning how to test the software configuration, as you prepare for the 312-50: Certified Ethical Hacker v10 exam
Explore general IoT concepts that will help you to understand what IoT devices are and how they operate and communicate with each other and their ecosystem
Discover the threats malware poses to a system by examining malware types and components, as you prepare for the 312-50: Certified Ethical Hacker v10 exam
Discover network sniffing and how it can be done, even on switched networks, to capture and sift through network packets, as you prepare for the 312-50: Certified Ethical Hacker v10 exam
Discover the requirements and objectives of the CEHv10 (312-50) exam and explore threats, the threat landscape, what motivates threat actors, and threat defense types
Explore web application hacking methodology through practical examples, from footprinting the target server to gaining root privileges
Explore multiple methods to hijack or use insecure configurations to gain unauthorized privileges, as you prepare for the 312-50: Certified Ethical Hacker v10 exam
Discover how SQL Injection can be used to enumerate database table and column information or access files on the database server file system
Explore Security policies and how they are used to protect information, systems, networks, and even physical threats, as you prepare for the 312-50: Certified Ethical Hacker v10 exam
Explore vulnerability management concepts, life-cycle, assessments, and tools, as you prepare for the 312-50: Certified Ethical Hacker v10 exam
Familiarize yourself with common tools used in wireless hacking, such as wireless adapters, network discovery tools, Aircrack-ng Suite, Fern Wifi Crackers, WiFi Pineapple and more
Explore network address translation on Cisco devices using Twice NAT and the newer Network Object NAT
Identity and access management (IAM) is used to protect your data by ensuring the right users have access to the right resources
Networking has always been one of the primary paths to becoming a security expert
In this CompTIA Security+ SY0-601 course, you'll explore a variety of core secure protocols
In this CompTIA Security+ SY0-601 course you will realize that real security begins with physical security
Whether you're an employee or contractor, this CompTIA Security+ SY0-601 course will have something you can use to improve the organizational security at your workplace
Common attack types social engineers use target victims using a long list of examples such as phishing, smishing, vishing, pretexting, pharming, tailgaiting, and shoulder surfing
In this course, you'll explore the basics of virtualization which is the foundation of modern data center cloud computing architecture
Learners will discover two core cryptography services, encryption and hashing, in this 14-video course
Explore the vulnerabilities and attacks that can lead to cloud systems being compromised, as you prepare for the 312-50: Certified Ethical Hacker v10 exam
Explore attacks geared towards Web Apps including injection-based and file/directory attacks, as you prepare for the 312-50: Certified Ethical Hacker v10 exam
Discover attacks against web apps using weak or broken authentication methods, and how cross-site scripting can be used to execute code
Discover how spyware and keyloggers can be used to clandestinely gather data from a target system, as you prepare for the 312-50: Certified Ethical Hacker v10 exam
Explore the process involved in cracking WEP, WPA, and WPA2 using Aircrack-ng
Discover various approaches that can be used to attack a cryptographic system, such as analytic, implementation, brute force, ciphertext only, meet in the middle, and replay attacks
Explore concepts that help you to understand cryptography, as you prepare for the 312-50: Certified Ethical Hacker v10 exam
Explore the concepts and techniques for performing Denial of Service and Distributed Denial of Service attacks and examine the various types of attacks
Explore how to evade intrusion detection systems, firewalls, and honeypots, as you prepare for the 312-50: Certified Ethical Hacker v10 exam
1 2 Next