Security CE Opportunites

Suggested Lynda Training Materials
Title Length of Time Description
Improve Your Data Governance and Security Skills (Training Course)    Business leaders, tech team managers, entrepreneurs, and anyone involved in the digital transformation of businesses and institutions will need a solid grounding in managing data and information. These foundational skills are rapidly becoming a legal necessity for anyone working in tech. Get started now!
Security Tips Weekly 2 hours and 36 minutes Business leaders, tech team managers, entrepreneurs, and anyone involved in the digital transformation of businesses and institutions will need a solid grounding in managing data and information. These foundational skills are rapidly becoming a legal necessity for anyone working in tech. Get started now! 
Security Matters (To Everyone)                                                          33 minutes 8 seconds Business leaders, tech team managers, entrepreneurs, and anyone involved in the digital transformation of businesses and institutions will need a solid grounding in managing data and information. These foundational skills are rapidly becoming a legal necessity for anyone working in tech. Get started now! 
IT Security: Key Policies and Resources                                       This course seeks to make key cybersecurity policies and resources clear and understandable - whether you work in IT, in business, or are just interested in how information security fits in with our public policies and laws. 
Learning Computer Security and Internet Safety                       1 hour 18 minutes Learn how to secure your Windows computer and protect your privancy online, in thi sbeginner's guide to computer security and internet safety.
Information Management: Document Security                                       1 hour 2 minutes Business leaders, tech team managers, entrepreneurs, and anyone involved in the digital transformation of businesses and institutions will need a solid grounding in managing data and information. These foundational skills are rapidly becoming a legal necessity for anyone working in tech. Get started now! 
Human Resources: Protecting Confidentiality                            50 minutes 4 seconds Learn abou the importance and responsibility of protecting confidentiality in the workplace. 
Learning Ransomware Countermeasures                                    1 hour 37 minutes Learn how to prevent and respond to ransomware attack.  Get an overview of the types of ransomware, and learn ways to safeguard your computer from attack.
JavaScript: Security Essentials                                                             45 minutes 23 seconds Ensure that your JavaScript applications are secure. Learn how to create more resilient code by effectively dealing with challenges such as cross-site forgery, server-side injection, and more.
iOS Development: Security                                                                  2 hours 6 minutes Learn development practices for buiolding secure iOS apps. Discover how to safeguard your apps from current and future threats using the keychain, biometrics, asymmetic cryptography, and more. 
Node.js: Security                                                                                      52 minutes 31 Seconds Learn best practices that can help Node.js Developer secure their apps at all levels, from packages to the server level.
React: Security Applications                                                                1 hour 37 minutes Learn how to reinforce the security of your React applications, protecting your code, data, users, servers, and more. 
SQL Server: Security for Developers                                               1 hour 27 minutes Learn how to protect databases and preserve the integrity of an organization's data by configuring security settings in SQL Server. 
Security Android Apps                                                                          1 hour 44 minutes Find out how to secure Android apps. Explore the Android Security Model, and Learn techniques to increasingly harden an Android App, secure known vulnerabilities, and test your work. 
Browsing the Web Securely                                                               43 minutes 42 seconds Discover how to protect your information, including your identity , your location, and data, while browsing the web.  Learn how to set up a personal VPN and use an anonymizing browser. 
MongoDB: Security                                                                              2 hours 21 minutes Discover how to create secured deployments of MongoDB for production-ready environments.
Cybersecurity Awareness: Security for Cloud Services         54 minutes 15 seconds Learn about the different types of cloud service offerings, the advantages and disadvantages of cloud security, and risk mitigation strategies.
Programming Foundations: Web Security                           2 hours 17 seconds Learn about the most important security concerns when developing websites, and what you can do to keep your servers, software, and data safe from harm.
AWS Security Best Practices for Developers 46 minutes 31 seconds Create stronger, more secure applications for AWS deployment. Learn security best practices for Identity and Access Management, S3 Storage, Key Management Service (KMS), and Cognito.
Securing Windows Server 2016: Securing Network Infrastructure 1 Hour 33 Minutes Learn how to secure network infrastructure, including virtual machines, in Windows Server 2016
SQL Server: Security, Encryption, and Masking 1 Hour Learn how to build more secure applications using the advanced security features in SQL Server 2017: row-level security, data encryption, and data masking.
Securing Windows Server 2016: Server Hardening Solutions  1 hour 11 minutes Learn about server hardening solutions for Windows Server 2016. Discover how to configure file and disk encryption, configure patches and updates, and implement antimalware.