Search result for Online Courses & Certifications
Get Course Alerts by Email
Proactive Computer Security
by Greg Williams- 4.7
Approx. 11 hours to complete
I’ve heard this before – “I’m not sure my computer security practices are working”. I reply “Have you tested them? ” This course is the fourth and final course in the Practical Computer Security specialization. In this course, you’ll learn how to proactively test what you have put in place to protect your data....
Segurança de TI: Defesa Contra as Artes Obscuras do Mundo Digital
by Google- 4.9
Approx. 26 hours to complete
Este curso aborda uma série de conceitos, ferramentas e práticas recomendadas de segurança de TI. Nele, temos uma introdução às ameaças e ataques e suas muitas formas de se manifestar. Daremos a você uma base de conhecimento sobre algoritmos de criptografia e como eles são usados para proteger dados. Ao fim deste curso, você entenderá:...
Cryptography
by (ISC)² Education & Training- 4.8
Approx. 14 hours to complete
Welcome to Cryptography! Cryptography is the practice and study of techniques for securing communications in the presence of third parties. You will learn how to protect information in order to ensure its integrity, confidentiality, authenticity, and non-repudiation. Course Objectives 1. Apply the fundamental concepts of cryptography 2. Describe the difference between symmetric and asymmetric cryptography...
Systems and Application Security
by (ISC)² Education & Training- 4.8
Approx. 17 hours to complete
Welcome to Systems and Application Security Course! In the Systems and Application Security Course, you will gain an understanding of computer code that can be described as harmful or malicious. Both technical and non-technical attacks will be discussed. You will learn how an organization can protect itself from these attacks. Objectives...
Check Point Jump Start: Network Security
by Check Point Software Technologies- 0.0
Approx. 5 hours to complete
In this course brought to you by industry leader Check Point, they will cover cybersecurity threats and elements of Check Point's Security Management architecture. This course will prepare you for the exam, #156-412, at PearsonVUE. (https://home. pearsonvue. com/checkpoint) Introduction to the Check Point Solution Introduction to the Check Point Solution Deploying Check Point Security Management...
Cryptography: Boolean functions and related problems
by Kutsenko Aleksandr , Anastasiya Gorodilova , Natalia Tokareva , Stjepan Picek , George Pintus- 4.3
Approx. 5 hours to complete
The course invites you to learn more about cryptography; you'll learn some important math which stands behind the ciphers, and defines how resistant the particular cipher will be to different types of attacks. The key topics covered in the course: * methods of cryptanalysis * AI and ML for cryptography. Welcome to the course, and enjoy your learning!...
Data Privacy Fundamentals
by Woodrow HartzogTop Instructor , Todd RelafordTop Instructor- 4.8
Approx. 9 hours to complete
This course is designed to introduce data privacy to a wide audience and help each participant see how data privacy has evolved as a compelling concern to public and private organizations as well as individuals. In this course, you will hear from legal and technical experts and practitioners who encounter data privacy issues daily....
Cybersecurity Compliance Framework & System Administration
by IBM Security Learning Services- 4.6
Approx. 16 hours to complete
This course gives you the background needed to understand the key cybersecurity compliance and industry standards. This knowledge will be important for you to learn no matter what cybersecurity role you would like to acquire or have within an organization. You will learn the basic commands for user and server administration as it relates to security....
Network Security & Database Vulnerabilities
by IBM Security Learning Services- 4.6
Approx. 14 hours to complete
This course gives you the background needed to understand basic network security. You will learn the about Local Area Networks, TCP/IP, the OSI Framework and routing basics. You will learn how networking affects security systems within an organization. You will learn the network components that guard an organization from cybersecurity attacks....
Security and Privacy for Big Data - Part 1
by Enrique Barra , Fabian Garcia Pastor- 4.6
Approx. 1 hour to complete
This course sensitizes regarding security in Big Data environments. You will discover cryptographic principles, mechanisms to manage access controls in your Big Data system. By the end of the course, you will be ready to plan your next Big Data project successfully, ensuring that all security related issues are under control....