Short CourseIndustrial Security Controls
Short Course

Kanban: A Concise Introduction

Kanban: A Concise Introduction

Industrial Security Controls

iconBeginner

icon5( 290 Reviews )

icon 0 hrs 29 mins

English

Industrial Security Controls

iconBeginner
icon5(290 Reviews)
icon0 hrs 29 mins Hrs
English
Introduction to kanban to visualize your workflow and make your team more efficient.

Introduction to kanban to visualize your workflow and make your team more efficient.

icon9 Premium Lessons
icon4 Quizzes & Assessments
iconCertificate of Completion

Create Your Free Account

Get immediate access to 25+ free cybersecurity and IT courses!

OR

Reviews

5

290 reviews

Average Course Rating

5 stars

83%

4 stars

12%

3 stars

2%

2 stars

2%

1 stars

1%

Related Courses

Short Course

CCNA - Understanding Routers and Switches

CCNA - Understanding Routers and Switches

Security Architecture and Operations

A comprehensive guide to understanding the in-depth functioning of routers and switches for the preparation of CCNA Exam.

iconIntermediate
icon2 hr
icon4.4

Short Course

SOC Lab: Threat Hunting com Wazuh + Grafana - Portuguese

SOC Lab: Threat Hunting com Wazuh + Grafana - Portuguese

Vulnerability Assessment and Pentesting

Threat Hunting Mastery: Integrando Wazuh e Fortalecendo a Segurança em Windows e Linux

iconIntermediate
icon14 hrs
icon4.5

Short Course

CISSP Certification Domains 5, 6, 7, and 8 Video Training

CISSP Certification Domains 5, 6, 7, and 8 Video Training

Cybersecurity

This course is ideal for individuals who desire to pass the Information Systems Security Professional CISSP Certification Exam and want to gain more insight and knowledge around IT, Information, and Cyber Security from a management/senior leader perspective.

iconIntermediate
icon7 hrs
icon4.5

Short Course

Curso Completo de Hacking Ético y Pentest con Metasploit - Spanish

Curso Completo de Hacking Ético y Pentest con Metasploit - Spanish

Cybersecurity

Domina Metasploit y técnicas de hacking ético: vulnerabilidades, explotación y creacion de malware ¡Desde 0 a experto!

iconAdvanced
icon16 hrs
icon3.8