Power BI Fundamentals - Create visualizations and dashboards from scratch
Google, IBM & Meta Certificates — Less Than ₹22/Day
Overview
Google, IBM & Meta Certificates — All 10,000+ Courses at 40% Off
One annual plan covers every course and certificate on Coursera. 40% off for a limited time.
Get Full Access
Explore how vendors are simplifying security integration in their products through this 90-minute webcast featuring experts from Dell Technologies, Red Hat, Cisco, and Microsoft. Gain actionable insights on improving architectures and automation to address the security professional deficit, benefiting State, Local, Tribal, and Territorial networks as well as SMBs. Learn about building security into systems, automating assessments, and implementing foundational control frameworks without additional resources. Discover topics such as authentication, software supply chain, shift left methodologies, transparency, Sigstore, SCV, source code security, hardware inventory, Software Bill of Materials, and automation techniques for enhanced security assurance.
Syllabus
Introduction
Authentication
Software Supply Chain
Shift Left
Foundational Controls
Transparency
Up the Stack
Sigstor
SCV
Source code
Microsoft initiatives
Inventory of hardware
Software Bill of Materials
Sigsto
Automation and assurance
Taught by
RSA Conference