Alles cursussen van Architect

Cursusafbeelding
ISO 27001:2022-Compliant Cybersecurity: Getting Started (LinkedIn Learning)
Discover why the ISO 27001-2022 standard is one of the most popular frameworks for building effective cybersecurity programs and learn what it takes to comply with and get certified as compliant with this standard. In this course, cybersecurity director Marc Menninger provides an overview of how to build an ISO 27001-2022-compliant cybersecurity program. Learn what this standard is and discover why it is used around the world as the guidebook for constructing information security programs that work. Dive into how the standard is organized and get a description of the certification process. Explore a step-by-step plan that you can follow if you want to build a cybersecurity program that complies with the ISO 2700-2022 standard. Additionally, go over gaps and criticisms of the standard and examine ways to fill those gaps. With the information in this course, you can begin to build a cybersecurity program that is both effective and compliant with ISO 27001-2022.Topics include:Deze cursus is enkel beschikbaar in het Engels. Als dit voor u geen probleem vormt, dien dan gerust uw aanvraag in.Deze cursus is enkel beschikbaar in het Frans. Als dit voor u geen probleem vormt, dien dan gerust uw aanvraag in.Aanvraag indienen
 
Cursusafbeelding
Project Management Simplified (LinkedIn Learning)
Almost everything you do in the workplace is a project, from the smallest task to the largest endeavor. All of this work can benefit from some basic project management skills. Once mastered, you will be able to transfer this valuable skillset to any project, of any size, in any industry. In this course, management trainer Chris Croft outlines the twelve steps to managing projects without creating a lot of extra overhead, and shows how to use traditional project management tools—such as Gantt charts and network diagrams—to help you succeed. Learn how to plan a project, manage resources, monitor progress, and deliver your project on time and on budget. Topics include: Deze cursus is enkel beschikbaar in het Engels. Als dit voor u geen probleem vormt, dien dan gerust uw aanvraag in. Aanvraag indienen
 
Cursusafbeelding
Exam Prep: Enterprise Architecture Foundations 9.2 (LinkedIn Learning)
The Open Group Architecture Framework, or TOGAF, is a framework and methodology for developing enterprise-level software. TOGAF provides an approach for designing, planning, implementing, and governing enterprise IT architecture. This high-level, systematic approach is designed to reduce error, maintain timelines, keep the project on budget and align IT with business units. If you’re looking to get certified in TOGAF, join Shane Chagpar in this course, as he provides an overview of the TOGAF Foundation exam, taking you step-by-step through the learning objectives for the Level 1 exam. Deze cursus is enkel beschikbaar in het Engels. Als dit voor u geen probleem vormt, dien dan gerust uw aanvraag in. Aanvraag indienen
 
Cursusafbeelding
Passer de l'approche en cascade à la gestion de projet agile (LinkedIn Learning)
Si votre direction cherche à bénéficier des projets agiles en matière de délai, de qualité et de budget, cette formation est faite pour vous. Avec Kelley O'Connell, vous saisirez la différence entre la méthodologie de la cascade et l'approche agile. Vous aborderez les prérequis puis vous mettrez en place un projet pilote, dans lequel vous identifierez aussi bien les supporters que les détracteurs. Outre les notions de base à acquérir, vous devrez également définir une vision et constituer votre équipe et, enfin, grâce aux rétrospectives, vous identifierez ce qui favorise la poursuite de votre déploiement agile. Aanvraag indienen
 
Cursusafbeelding
Visuals gebruiken in Power BI
Grâce à la puissance et à la simplicité de Power BI, comprenez rapidement vos données et faites-les parler. Spécialiste en apprentissage automatisé, Nicolas Georgeault vous accompagne dans ce cours sur l'analyse de données avec le langage DAX. À partir de sources de données brutes, vous construirez les différents éléments qui permettent la réalisation d'un rapport Power BI avancé. Vous passerez en revue quelques concepts tels que la conception des modèles de données. Vous verrez aussi comment transformer des données selon leur format afin de constituer les mesures nécessaires à la création d'un tableau de bord. Une fois normalisées, filtrées et augmentées, vos données seront plus faciles à comprendre par les utilisateurs de vos rapports Power BI. Ils seront en mesure de prendre des décisions plus rapidement à la lumière des transformations que vous aurez effectuées. Aanvraag indienen
 
Cursusafbeelding
Learning Power BI Desktop (LinkedIn Learning)
Power BI Desktop—the powerful data analysis and visualization software from Microsoft—can help you get more insights from your data, whether that data is stored on your computer or in the cloud. In this course, discover how to leverage this easy-to-use tool to more efficiently model and visualize data. Learn how to connect various data sources, including Excel, databases, and web data sources like Wikipedia. Explore how to search and transform your data using the built-in Query Editor. Plus, instructor Gini von Courter shows how to build and arrange visualizations, create interactive reports, share your work, manage your published files in the Power BI service, and more. Deze cursus is enkel beschikbaar in het Engels. Als dit voor u geen probleem vormt, dien dan gerust uw aanvraag in. Deze cursus is enkel beschikbaar in het Frans. Als dit voor u geen probleem vormt, dien dan gerust uw aanvraag in. Aanvraag indienen
 
Cursusafbeelding
Advanced Cisco Routing: RIP and EIGRP (LinkedIn Learning)
The decisions you make about routing determine how your information moves from place to place. And if you’re an IT administrator working with Cisco, you need to understand the various routing protocols that are available as well as how to effectively configure and manage them within your organization. In this course, instructor Jarrel Rivera gives you an in-depth overview of advanced routing in Cisco. Explore the basics of the Routing Information Protocol (RIP), before turning to the Enhanced Interior Gateway Routing Protocol (EIGRP), a more advanced distance-vector protocol for network route configuration. Along the way, Jarrel provides step-by-step demos using IPv4 and IPv6 addresses. By the end of this course, you’ll have the skills you need to leverage RIP and EIGRP so you can get the most out of your network topology. Deze cursus is enkel beschikbaar in het Engels. Als dit voor u geen probleem vormt, dien dan gerust uw aanvraag in. Deze cursus is enkel beschikbaar in het Frans. Als dit voor u geen probleem vormt, dien dan gerust uw aanvraag in. Aanvraag indienen
 
Cursusafbeelding
Angular: Testing and Debugging (LinkedIn Learning)
Errors caused by missing dependencies, undefined variables, or poorly formatted data can cause your web application to stop working. In this course, learn how to track down and eliminate these types of errors in your Angular applications through the process of testing and debugging. Instructor Derek Peruo breaks down common error messages and goes over a variety of testing and debugging options. He also covers code linting, shares some tips and tricks for avoiding pitfalls during development, and goes into writing custom error handlers to make it easier to work with errors as your application grows. Deze cursus is enkel beschikbaar in het Engels. Als dit voor u geen probleem vormt, dien dan gerust uw aanvraag in. Deze cursus is enkel beschikbaar in het Engels. Als dit voor u geen probleem vormt, dien dan gerust uw aanvraag in. Aanvraag indienen
 
Cursusafbeelding
Advanced Java Programming (LinkedIn Learning)
Want to get more out of the Java language and platform? In this platform- and framework-neutral course, instructor Bethan Palmer digs into some of the language’s more advanced features, helping you expand your programming skills as she equips you with techniques you can use when building applications anywhere Java is used: in web, mobile, and desktop applications. Bethan covers a variety of topics, including generics, working with the Collections Framework, and functional programming. Plus, learn about I/O in Java, working with files and directories, and structuring applications using the modular system available in Java. Learning objectives : Installing the NetBeans IDE Using generic methods in Java Using wildcards in generic programming Implementing a queue with a LinkedList Functional programming in Java Multi-threading Working with I/O in Java Managing files and directories Aanvraag indienen
 
Cursusafbeelding
Webinar ReUse, All that data (OpenCourses)
Kunnen herbruikbare diensten een rol spelen in het beheer van grote hoeveelheden data? Hoe kunnen we het volume beperken? De kwaliteit garanderen? De kosten beheersen? Verschillende specialisten zullen dieper ingaan op herbruikbare diensten voor het beheren, kwalitatief verbeteren, opslaan en archiveren van grote datasets.
 
Cursusafbeelding
Power BI avancé : L'analyse de données avec DAX (LinkedIn Learning)
Grâce à la puissance et à la simplicité de Power BI, comprenez rapidement vos données et faites-les parler. Spécialiste en apprentissage automatisé, Nicolas Georgeault vous accompagne dans ce cours sur l'analyse de données avec le langage DAX. À partir de sources de données brutes, vous construirez les différents éléments qui permettent la réalisation d'un rapport Power BI avancé. Vous passerez en revue quelques concepts tels que la conception des modèles de données. Vous verrez aussi comment transformer des données selon leur format afin de constituer les mesures nécessaires à la création d'un tableau de bord. Une fois normalisées, filtrées et augmentées, vos données seront plus faciles à comprendre par les utilisateurs de vos rapports Power BI. Ils seront en mesure de prendre des décisions plus rapidement à la lumière des transformations que vous aurez effectuées. Aanvraag indienen
 
Cursusafbeelding
Power BI avancé : Requêtes de données avec Power Query (LinkedIn Learning)
Dans cette formation qui s'adresse aux analystes de données, vous apprendrez à tirer parti des fonctions avancées de l'éditeur de requêtes Power Query, notamment à l'aide du langage M. Avec Nicolas Georgeault, vous aborderez les enjeux de la multiplication des sources de données, puis vous ferez un tour d'horizon de Power BI. Ensuite, à l'aide de cas concrets, vous travaillerez avec les données, l'éditeur de requêtes Power Query et le langage M, puis vous finirez sur l'utilisation de modèles de données et les fonctionnalités avancées. À la fin de cette formation, vous serez à même de mettre en œuvre, de manière optimale, des requêtes de données Power Query. Aanvraag indienen
 
Cursusafbeelding
Power BI : Visualisations avancées et notions clés du DAX (LinkedIn Learning)
Vous connaissez les bases de Power BI mais vous souhaitez passer à la vitesse supérieure ? Lancez-vous dans l'analyse de données avec les visualisations avancées et les notions indispensables du langage DAX. Dans ce cours, André Meyer, auteur sur Power BI et l'informatique décisionnelle, vous aide à aller plus loin dans le paramétrage des visuels. Vous intégrerez les éléments dynamiques et interactifs dans la requête et dans le tableau de bord. Puis vous aborderez l'écriture de formules en langage DAX conjuguée à la puissance de Power BI. Vous aurez une maîtrise complète de la création d'un tableau de bord, ainsi que les clés du langage DAX pour ouvrir les portes d'une nouvelle dimension de l'analyse. Aanvraag indienen
 
Cursusafbeelding
Power BI : L'analyse de données avec R (LinkedIn Learning)
Si vous êtes analyste et que vous souhaitez aller plus loin dans la visualisation des données dans Power BI, suivez cette formation consacrée à l'utilisation conjointe du langage de programmation R avec le service d'analyse et de décision de Microsoft. Après vous avoir présenté le langage R, Nicolas Georgeault vous accompagnera dans son installation ainsi que celle de ses dépendances. Puis, vous aborderez les différents moyens de visualisation statique et dynamique. À la fin de cette formation, vous aurez toutes les bases pour tirer parti du langage R au sein de Power BI. Aanvraag indienen
 
Cursusafbeelding
L'essentiel de Power BI (LinkedIn Learning)
Dans cette formation d'André Meyer vous découvrirez Power BI, la solution de Microsoft pour analyser, consulter et partager les données. Après avoir abordé les principes, les composants, le but de cette formation et la configuration, vous entrerez dans le vif du sujet avec des exemples concrets. Vous verrez comment effectuer des requêtes de données vers Excel et d'autres sources, puis comment préparer ces données. Vous apprendrez à créer des tables et des relations, des tables de temps et à exploiter vos données sous forme de visuels. Enfin, vous procéderez au filtrage des données et à leur exportation aux formats PDF et Excel. Aanvraag indienen
 
Cursusafbeelding
Power BI Quick Tips (LinkedIn Learning)
This collection of Microsoft Power BI quick tip videos is designed to demonstrate helpful tricks and quickly explain useful features. Discover quick ways to connect data, analyze data, and create visualizations in one place. Plus, explore how to connect and embed data, edit a group workspace, customize a dashboard for mobile phone viewing, and more. Aanvraag indienen
 
Cursusafbeelding
Power BI Top Skills (LinkedIn Learning)
You don’t need a dedicated team to unlock insights into your data. All you need is Power BI. Power BI is a powerful data analytics tool that is streamlining the way business works with data. In this course, instructor John David Ariansen teaches the essential skills you need to analyze data effectively with Power BI. Explore the difference between Power BI Desktop and the Power BI service. Learn key skills, such as importing data, manipulating data, managing relationships, working with Data Analysis Expressions (DAX), and building visualizations and reports. After watching this course, you can feel confident using Power BI for all your business intelligence and reporting needs. This course was created by Madecraft. We are pleased to host this content in our library. Aanvraag indienen
 
Cursusafbeelding
L'essentiel de JavaScript
Dans cette formation d'André Meyer vous découvrirez Power BI, la solution de Microsoft pour analyser, consulter et partager les données. Après avoir abordé les principes, les composants, le but de cette formation et la configuration, vous entrerez dans le vif du sujet avec des exemples concrets. Vous verrez comment effectuer des requêtes de données vers Excel et d'autres sources, puis comment préparer ces données. Vous apprendrez à créer des tables et des relations, des tables de temps et à exploiter vos données sous forme de visuels. Enfin, vous procéderez au filtrage des données et à leur exportation aux formats PDF et Excel. Aanvraag indienen
 
Cursusafbeelding
Ethical Hacking: System Hacking (LinkedIn Learning)
System hacking is the way hackers get access to individual computers on a network. Ethical hackers learn system hacking to detect, prevent, and counter these types of attacks. This course explains the main methods of system hacking—password cracking, privilege escalation, spyware installation, and keylogging—and the countermeasures IT security professionals can take to fight these attacks. Security expert Lisa Bock also covers steganography, spyware on a cell phone, and tactics for hiding files and tools. These tutorials, along with the other courses featured in the Ethical Hacking series, will prepare students to pass the Certified Ethical Hacker exam and start a career in this in-demand field. Find out more about the exam at https://www.eccouncil.org/programs/certified-ethical-hacker-ceh/. Learning Objectives: Acquiring passwords Generating rainbow tables Understanding where passwords are stored Defending against privilege escalation Understanding spyware Protecting against keylogging Detecting steganography How hackers cover their tracks Aanvraag indienen
 
Cursusafbeelding
Ethical Hacking: Hacking IoT Devices (LinkedIn Learning)
The number of IoT (internet of things) devices being deployed is growing exponentially and securing those devices is a huge challenge. In this course, Luciano Ferrari discusses how IoT devices work, including the architectures and protocols used. He covers the main attack surfaces used by hackers and security professionals against IoT devices, how to assess IoT security threats and vulnerabilities, and how to properly secure the devices by following industry best practices and implementing countermeasures.Learning Objectives: How IoT devices work IoT technologies and protocols IoT communication models Common OWASP vulnerabilities Overcoming inherent IoT challenges Attacks occurring on IoT devices Methodologies used for hacking Securing IoT devices Aanvraag indienen
 
Cursusafbeelding
Ethical Hacking: Social Engineering (LinkedIn Learning)
Social engineering is a technique hackers use to manipulate end users and obtain information about an organization or computer systems. In order to protect their networks, IT security professionals need to understand social engineering, who is targeted, and how social engineering attacks are orchestrated.In this course, cybersecurity expert Lisa Bock discusses the methods a hacker might use, including embedding malicious links and attachments in emails and using mobile devices and social media to deploy an attack. She discusses the concept of "misuse of trust"—how hackers use charm, power, and influence to penetrate an organization—and why you need to be extra cautious with the disgruntled employee. Finally, Lisa discusses countermeasures security professionals can take to address these attacks.Note: This course maps to the Social Engineering competency of the Certified Ethical Hacking exam. Review the exam objectives at https://www.eccouncil.org/programs/certified-ethical-hacker-ceh/. Learning Objectives: Visualizing the victim Recognizing an attack Using charm, power, and influence Manipulating with social media Preventing insider attacks Stealing identities Pen testing with social engineering Taking countermeasures Aanvraag indienen
 
Cursusafbeelding
AngularJS 1 Form Validation (LinkedIn Learning)
Validation is key to successful online forms. Implementing dynamic form validation that reacts to input can be difficult to implement with languages like JavaScript and jQuery. However, AngularJS allows you to take advantage of two-way data-binding functionality without having to write any JavaScript code. This makes reacting to input from the user—as it happens—a breeze. In this short course, Ray Villalobos shows how to implement form validation on any HTML form using the built-in validation properties and methods in AngularJS. Together, you'll look at how AngularJS can help style forms dynamically as the user updates the content. Plus, explore how to implement validation with JavaScript, just in case you need more fine-tuned control of form interactions. Aanvraag indienen
 
Cursusafbeelding
AngularJS 1 Building a Data-Driven App (LinkedIn Learning)
Want to create data-driven web applications? AngularJS is a great choice. It allows you to build apps where multiple users can push and pull data at the same time, in real time. However, while the framework is easy to learn, it can be tough to master. This course is the second in a two-part series designed to show you how Angular works in the real world. It takes up where AngularJS 1: Adding Registration to Your Application left off: a simple application that checks users in and out of meetings. Here, instructor and Angular advocate Ray Villalobos shows how to enhance the existing app with new views and controllers to reward random checked-in users with prizes. Learn how to create forms, edit database records, create methods, randomize record selections, and style and secure your app. With these project-based lessons, you'll learn how to see how data-driven programming with AngularJS can help your apps react to real-time data streams. Aanvraag indienen
 
Cursusafbeelding
IT Security Foundations: Network Security (LinkedIn Learning)
Network security is an important component of the Microsoft Technology Associate (MTA), Security Fundamentals exam (98-367). In this course, Lisa Bock covers one of the main topics of the exam: securing an organization's network, to keep interconnected systems and data safe. The course introduces security devices such as firewalls and honeypots. In addition, she reviews the importance of isolating networks with VLANS and NAT addressing, along with a review of common security protocols. She also provides overviews of how to protect clients with antivirus software, encrypt folders and files, and implement software restriction policies. Finally, she looks at the often-overlooked topic of physical security, which includes securing a building's perimeter and the hardware within. Note: Learn more about the Microsoft Technology Associate (MTA) Security Fundamentals exam (98-367) at https://www.microsoft.com/learning/en-us/exam-98-367.aspx. Aanvraag indienen
 
Cursusafbeelding
Learning Cryptography and Network Security (LinkedIn Learning)
Though technology changes rapidly, the need to assure the confidentiality, integrity, authenticity, and accountability of information does not. Understanding the basics of cryptography is fundamental to keeping your networks, systems, and data secure. In this course, Lisa Bock reviews the historical and present-day uses of encryption, including techniques such as symmetric and asymmetric encryption, algorithms, and hashing. She also reviews message digest and passwords and discusses practical ways to apply cryptography to ensure data security and integrity. By the end of this course, you'll have a solid understanding of what it takes to move and store data securely. Aanvraag indienen
 
Cursusafbeelding
La sécurité informatique et cybersécurité : Niveau avancé (LinkedIn Learning)
En tant que responsable de la sécurité ou DSI, vous devez mettre en place une politique de cybersécurité pour répondre aux menaces qui pèsent sur votre informatique. Pour cela, Pierre Cabantous vous propose de faire un tour de la cybersécurité en entreprise. Dans ce cours, vous étudierez la démarche d'un pirate, avant et après l'intrusion dans un système, à la suite de l'exploitation d'une vulnérabilité. Vous verrez comment gérer ces vulnérabilités par rapport à un niveau de risque que vous apprendrez à calculer. Vous aborderez aussi une des principales menaces encourues aujourd'hui par tout service accessible en ligne : les attaques par déni de service. Puis vous découvrirez comment protéger votre organisation aux niveaux technique et organisationnel, en suivant des bonnes pratiques, des process ainsi que des normes européennes comme le RGPD. Deze cursus is enkel beschikbaar in het Frans. Als dit voor u geen probleem vormt, dien dan gerust uw aanvraag in. Aanvraag indienen //
 
Cursusafbeelding
Building a Full-Stack App with Angular 2+ and Spring Boot (LinkedIn Learning)
Angular 2 can serve as the primary MVC framework for your application, or it can supplement a server-side solution like Laravel or ASP.NET. In this course, Derek Peruo guides you through the process of transforming your Angular 2 single-page application (SPA) into a widget-based application for use with server-side frameworks. Plus, he goes into single-page and widget-based architectures, as well as common patterns for communicating between your server-side and client-side frameworks. Topics include: Single-page applications and widget-based applications Creating a new Laravel project Moving Angular files into Laravel Migrating Angular routing and Angular modules Using global variables Adding stateless API routes Using basic REST requests Using route parameters in controllers Aanvraag indienen
 
Cursusafbeelding
Building Native Mobile Apps with NativeScript and Angular 2 (LinkedIn Learning)
NativeScript is an open-source framework for building native iOS and Android apps. Web developers who are familiar with Angular 2 can get introduced to NativeScript in this course and learn how to develop an application for iOS and Android by leveraging the NativeScript framework with Angular 2. Join Alex Ziskind as he guides you from the initial installation of NativeScript through architecting an application. He explains how to declare the most common user interface widgets while styling them with CSS. Plus, he demonstrates how to set up the Faker library, and how to programmatically tap into the native navigation engine for iOS and Android. Topics include: Setting up the development environment Using the NativeScript CLI Using Angular with NativeScript Angular bootstrap Application architecture Components User interface NativeScript widgets Application lifecycle Data and event binding Navigation Aanvraag indienen
 
Cursusafbeelding
Managing Data in Angular 2 Applications (LinkedIn Learning)
All web applications use data, which can come from a server or be stored locally in the browser. In Managing Data in Angular 2 Applications, Derek Peruo guides you through the process of retrieving and saving data for your Angular applications, both in the browser and on a server. He also introduces tips and tricks for customizing data management as your application grows in size and complexity. Learn about the various storage options and when and where to use each type, and find out how to write custom services to manage the data for a fast-growing Angular app. Topics include: Overview of data storage options Saving and retrieving data from the browser Setting routes in the URL Using query strings and fragments instead of routes Saving and retrieving data from a server Working with user input Using JSONP instead of HTTP Why writing custom services is important Writing custom services for working with browsers and servers Aanvraag indienen
 
Cursusafbeelding
Découvrir l'écosystème d'Angular (LinkedIn Learning)
Deze cursus is enkel beschikbaar in het Frans.  Si vous êtes un développeur formé à JavaScript ou TypeScript, suivez cette présentation de l'environnement de développement Angular. Vous aborderez les différents outils et vous découvrirez quel est le rôle et l'intérêt des serveurs et des bases de données. Vous verrez également les outils de développement pour appareils mobiles, ainsi que les techniques de test et de débogage, avant de passer à l'intégration continue et au déploiement. À la fin de cette formation, vous aurez les bases indispensables pour développer et également pour poursuivre votre formation avec Angular. Aanvraag indienen
 
Cursusafbeelding
Java Persistence API (JPA): 1 The Basics (LinkedIn Learning)
The Java Persistence API (JPA) is the standard for mapping Java objects to relational databases. JPA provides several advantages over traditional data access methods like Java Database Connectivity (JDBC). In this practical course, Kesha Williams discusses these advantages and acquaints you with the basics of JPA, entity management, transaction management, and relationship mapping. Upon completing this course, you'll be equipped with a firm understanding of JPA and persisting data in Java enterprise applications. Topics include: What is persistence? JPA configuration and entities Benefits of JPA over pure JDBC Managing entities with the EntityManager API Creating, persisting, reading, updating, and deleting objects Managing transactions Advanced mapping techniques using annotations How to map relationships Aanvraag indienen
 
Cursusafbeelding
Java 8 Essential Training (LinkedIn Learning)
If you want to build applications for mobile devices, desktop computers, or the web, you need to know Java. This course provides the foundation for learning Java SE (Standard Edition), so you can build your first apps or start exploring the language on your own. Author David Gassner shows how to install Java and the IntelliJ IDEA IDE, and start working with variables, data types, keywords, and other critical language components. He also helps you control program flow with conditional logic and loops, store data with the Java Collections Framework, and understand how Java implements object-oriented coding principles such as inheritance and polymorphism. Topics include: Understanding the history and principles of Java Installing Java, IntelliJ IDEA, and BlueJ Creating a Java project Working with variables, values, and expressions Working with object data types Building, comparing, and parsing strings Debugging and exception handling Creating loops and reusable code Passing arguments by reference or value Using simple and complex arrays Creating custom classes Understanding inheritance and polymorphism Managing files with Java libraries Documenting code with Javadoc Packaging classes in JAR files Aanvraag indienen
 
Cursusafbeelding
Java: XML Integration (LinkedIn Learning)
Learn how to choose the right Java API for your application and get started coding with XML and Java. In this course, author David Gassner shows you how to read and create XML strings and files, decide whether to use a streaming or tree-based API, and find out which APIs are compatible with Android. Plus, discover how to use both standard APIs that are included with the Java SE and EE distributions, such as DOM, SAX, and JAXB, and learn about popular open-source libraries such as JDOM and the Simple XML Serialization framework. Topics include: Choosing a Java-based XML API Reading XML as a string Comparing streaming and tree-based APIs Parsing XML with SAX Creating and reading XML with DOM Adding data to an XML document with JDOM Reading and writing XML with StAX Working with JAXB and annotated classes Comparing Simple XML Serialization to JAXB Aanvraag indienen
 
Cursusafbeelding
Performing a Technical Security Audit and Assessment (LinkedIn Learning)
This course follows a proven methodology for conducting thorough and effective technical security audits and assessments based on guidelines from NIST. Learn how to develop the testing methodology essential for technical security reviews. Discover how to identify and analyze targets, use key technical testing tools, identify and mitigate findings, and more. Performing technical information security audits and assessments is essential to protecting information assets. By the end of this course, you'll know how to determine if your network is secure. Topics include: Developing technical security assessments Conducting technical security reviews Identifying and analyzing targets Validating target vulnerabilities Planning a technical assessment Conducting a technical assessment Implementing remediation and mitigation Aanvraag indienen
 
Cursusafbeelding
IT Security: Key Policies and Resources (LinkedIn Learning)
Cybersecurity can be daunting because of its technical complexity and the ever-changing threats that professionals must grapple with. And more than ever, cybersecurity is not just an IT issue, but a core business issue for organizations of all kinds. Just like other business issues—such as finance, legal, or human resources—cybersecurity has its own set of external policies, laws, rules, established practices, and resources for getting help. Getting to know these policies and resources better across your organization—and not just within your IT department—can be hugely beneficial to your company. This course seeks to make key cybersecurity policies and resources clear and understandable—whether you work in IT, in business, or are just interested in how information security fits in with our public policies and laws. Aanvraag indienen
 
Cursusafbeelding
Ethical Hacking: Introduction to Ethical Hacking (LinkedIn Learning)
What is ethical hacking? When it comes to cybersecurity, hacking comes in many colors: white, grey, black, and shades in between. White hat hackers use their skills for good. They practice ethical hacking: involved testing to see if an organization's network is vulnerable to outside attacks. Ethical hacking is key to strengthening network security, and it's one of the most desired skills for any IT security professional. If you're interested in becoming an ethical hacker, or getting started securing your own network, this introduction is for you. Security expert Lisa Bock explores today's threat landscape, dissecting the top attack vectors and motives for attacks. Lisa identifies a variety of ways to secure an organization, explores policies that help enforce security objectives, and more.Note: The Ethical Hacking series maps to the 20 parts of the EC-Council Certified Ethical Hacker (CEH) exam (312_50) version 10.Learning Objectives:Today's threat landscapeManaging incidentsCreating security policiesProtecting dataThe COBIT frameworkConducting penetration testing Aanvraag indienen
 
Cursusafbeelding
DevOps Foundations: DevSecOps (LinkedIn Learning)
Security is a major concern in the DevOps world. There is a constant push for companies to move more quickly, and security teams struggle to keep up with testing. This has led to the rise of a new field: DevSecOps. This course introduces the concept of DevSecOps and explains how an organization can build out a DevSecOps program that helps teams integrate security into the application development pipeline. Learn about the role of APIs, containers, and automation, and how a continuous integration and delivery framework can help your organization run security tests as often as developers want. Instructor Tim Chase also introduces some free tools and resources for starting your DevSecOps journey. Aanvraag indienen
 
Cursusafbeelding
Programming Foundations: Web Security (LinkedIn Learning)
Learn about the most important security concerns when developing websites, and what you can do to keep your servers, software, and data safe from harm. Instructor Kevin Skoglund explains what motivates hackers and their most common methods of attacks, and then details the techniques and mindset needed to craft solutions for these web security challenges. Learn the eight fundamental principles that underlie all security efforts, the importance of filtering input and controlling output, and smart strategies for encryption and user authentication. Kevin also covers special considerations when it comes to credit cards, regular expressions, source code managers, and databases. This course is great for developers who want to secure their client's websites, and for anyone else who wants to learn more about web security. Topics include: Why security matters What is a hacker? How to write a security policy Cross-site scripting (XSS) Cross-site request forgery (CSRF) SQL injection Session hijacking and fixation Passwords and encryption Secure credit card payments Aanvraag indienen
 
Cursusafbeelding
Ethical Hacking: Mobile Devices and Platforms (LinkedIn Learning)
What is ethical hacking? When it comes to cybersecurity, hacking comes in many colors: white, grey, black, and shades in between. White hat hackers use their skills for good. They practice ethical hacking: involved testing to see if an organization's network is vulnerable to outside attacks. Ethical hacking is key to strengthening network security, and it's one of the most desired skills for any IT security professional. If you're interested in becoming an ethical hacker, or getting started securing your own network, this introduction is for you. Security expert Lisa Bock explores today's threat landscape, dissecting the top attack vectors and motives for attacks. Lisa identifies a variety of ways to secure an organization, explores policies that help enforce security objectives, and more.Note: The Ethical Hacking series maps to the 20 parts of the EC-Council Certified Ethical Hacker (CEH) exam (312_50) version 10.Learning Objectives:Today's threat landscapeManaging incidentsCreating security policiesProtecting dataThe COBIT frameworkConducting penetration testing Aanvraag indienen
 
Cursusafbeelding
Ethical Hacking: Wireless Networks (LinkedIn Learning)
Wireless networks are convenient and popular, but poor configuration and encryption leave them open to attack. Hackers can use Wi-Fi vulnerabilities to infiltrate your entire network. Security professionals need to know how to detect, prevent, and counter these kinds of attacks using the latest tools and techniques—the subject of this course with cybersecurity expert Malcolm Shore. Malcolm covers everything from configuring basic security to understanding how hackers extract passwords, harvest connections at rogue access point, and attack networks via Bluetooth. He also explains how to select the right antennae for testing and introduces some sophisticated Windows and Linux tools to scan for vulnerabilities, including Acrylic, Ekahau, and Wireshark. By the end of the course, you should be able to shore up your wireless connections and gain confidence that your local network is safe to use.Note: This course is part of our test prep series for the Certified Ethical Hacker exam. Review the complete exam objectives at https://www.eccouncil.org/programs/certified-ethical-hacker-ceh/.Learning Objectives:Selecting an antennaConfiguring securityExtracting WEP and network passwordsTesting passwordsHarvesting connections from rogue access pointsAttacking networks via BluetoothCapturing wireless packets with Acrylic Wi-FiHeat mapping with EkahauWi-Fi sniffing with WiresharkTesting the Internet of Things Aanvraag indienen
 
Cursusafbeelding
CCNA Security (210-260) Cert Prep: 5 Cisco Firewall Technologies (LinkedIn Learning)
The Cisco Certified Network Associate (CCNA) Security certification indicates to potential employers that you have the required skills to secure a network. Join security ambassador Lisa Bock, as she prepares you for the Cisco Firewall Technologies section of the CCNA Security exam 210-260: Implementing Cisco Network Security. Lisa covers firewall technologies, diving into the concept of a firewall, firewall security contexts, and how to do a basic firewall configuration. She also compares different types of firewalls including stateless, stateful, and application firewalls. She also reviews implementing NAT on Cisco ASA along with zone-based firewalls. To wrap up, she takes a closer look at some firewall features on the Cisco ASA such as Access Management, Modular Policy Framework, and high availability. Topics include: Firewall services and security contexts Basic firewall configuration Stateless versus stateful firewalls Implementing NAT on Cisco ASA Zone-based firewalls Access Management Implementing high availability Cisco Modular Policy Framework Aanvraag indienen
 
Cursusafbeelding
Learning Cisco CLI Switch Configuration (LinkedIn Learning)
Learn how to configure a Cisco switch to connect and control resources on your network. Join Denise Allen-Hoyt in this course, as she explores the Cisco command-line interface using an out-of-band connection with a cable and terminal program. She'll show how to access the switch's three modes—user EXEC, privileged EXEC, and global configuration—and use commands to configure essential settings. After addressing the switch and configuring a default gateway, Denise shows how to modify individual port modes, secure those ports, and create and manage virtual LANs (VLANs). In the final chapter, she'll show how to verify your settings and reset the switch if necessary. Topics include: Accessing a switch Configuring the terminal program Configuring a switch hostname Saving and viewing configurations Securing access Encrypting passwords Assign an IP address to a switch Exploring port modes and security Creating VLANs Resetting a switch Aanvraag indienen
 
Cursusafbeelding
Drupal 8 Essential Training 1: The Basics (LinkedIn Learning)
Drupal 8 Essentials is designed to help anyone create a simple website using Drupal, the free web design software that powers personal blogs as well as the sites of some of the world's largest corporations.This course is the first of the series. No prerequisites are required beyond basic computer skills! These easy-to-follow tutorials show how to install Drupal and other necessary components on a Windows or Mac computer, navigate Drupal's web-based interface, configure the settings of a new Drupal site, create content, and move the site to a server. Every step includes best practices to ensure your website remains streamlined, secure, and up-to-date.Watch Drupal 8 Essentials 2: Building Out Your Website to find out how to finesse your site with categories, comments, custom styles, and other special features.Topics include: Comparing Drupal to other software Getting help with Drupal Installing Acquia Dev Desktop on Mac and Windows Installing the Drupal database, modules, and themes Creating basic content Establishing your site's look and feel Adjusting security settings Adding images and metadata Adding a sidebar Moving your Drupal website to a server Backing up a Drupal site Aanvraag indienen
 
Cursusafbeelding
Drupal 8 Essential Training 2: Building Out Your Website (LinkedIn Learning)
Your Drupal site is built. Now what? Web design doesn't stop once the website is launched. Learn how to build out your Drupal site to better fit your visitors' needs.In these tutorials, Tom Geller helps new Drupal designers change the layout and design elements of their sites, control visitor interactions (including comments), arrange content in user-friendly "views," and expand the site's capabilities beyond what's available in core Drupal with Drupal modules. In all the steps you'll learn best practices to ensure your sites remain streamlined, secure, and up to date.If you want to start from the beginning and create your Drupal site from scratch, check out Drupal 8 Essentials 1: Getting Started.Topics include: Grouping content into categories Managing comments Adding discussion groups Customizing fields and image styles Adjusting menus and navigation to help users Adding new features with Drupal modules Aanvraag indienen