This course outlines important data security measures to be taken by individuals to protect sensitive data and PI. Some of the topics include how to prevent data breaches, safeguard, protecting your personal information, and different types of breaches. The security measures outlined in this course not only protect the individual (mobile devices, etc) but also protect data up to the corporate level. These safe practices can prevent hacking into personal social media accounts up to hacking of sensitive corporate data and data breaches. Learn how to better protect yourself and your company by implementing these security measures into your usage.
Keynotes from the O'Reilly Security Conference, New York 2016 are available now.
In this Network Technology and Security Fundamentals training course, expert author David Miller teaches you how to secure and protect information as it flows across an enterprise network.
If you share resources across your network or the cloud, you need a firm grasp of all of the security implications. In this Learning Path, you’ll get hands-on experience securing your infrastructure while learning about risk assessment and management, sensitive data, computer forensics, penetration testing, and much more. By the end of this course, you’ll know how to secure your data and keep it that way.
In this Introduction to Hadoop Security training course, expert author Jeff Bean will teach you how to use Hadoop to secure big data clusters. This course is designed for users that are already familiar with the basics of Hadoop.
Create secure PHP code and prevent attacks and exploits in your code - This is an Essential course for all developers.