Cybersecurity
DevOps Cloud
IT Operations Cloud
This role-based training covers how security administrators build a solution from scratch, implement an innerweb and access to and from the internet by a series of proxy services. This course explores several security scenarios through encrypted technologies, certificate management, authentication, and authorization.
Find more information and register here: