Search result for It fundamentals for cybersecurity specialization Online Courses & Certifications
Get Course Alerts by Email
Information Security Management Fundamentals for Non-Techies
by Alton Hardin | 100,000+ Enrollments Worldwide- 4.5
10 hours on-demand video
Learn the Fundamentals of Information Security Management for Non-Techies LEARN INFORMATION SECURITY FUNDAMENTALS FROM ONE OF UDEMY’S TOP IT INSTRUCTORS Are you a business or aspiring IT professional that needs to better understand how cybersecurity works? 5-hour course, I'll show you step-by-step, the fundamentals of information security management, teaching you essential cybersecurity core principles you need to know....
$19.99
Understanding Google Cloud Security and Operations
by Google Cloud Training- 4.6
Approx. 2 hours to complete
First, it explores how businesses can choose to maintain some or none of their own infrastructure by purchasing IT services from a cloud provider. Next, it explains how the responsibility of data security is shared between the cloud provider and the business, and explores the defense-in-depth security built into Google Cloud. Best practices for managing Google Cloud costs...
Data Collection and Processing with Python
by Paul Resnick , Jaclyn Cohen- 4.7
Approx. 16 hours to complete
It covers Python list comprehensions and provides opportunities to practice extracting from and processing deeply nested data. You'll also learn how to use the Python requests module to interact with REST APIs and what to look for in documentation of those APIs. For the final project, you will construct a “tag recommender” for the flickr photo sharing site....
Introduction to Java
by Noel J. Bergman , Evan Bergman- 4.6
Approx. 12 hours to complete
The Core Java Specialization, in turn, is part of a series of programming specializations, derived from LearnQuest's private Java Bootcamps, designed to provide the skill set necessary to be hired as an IT developer using Java in many corporate environments. Overview of the Core Java Specialization Java Language Fundamentals - Types...
Python Functions, Files, and Dictionaries
by Paul Resnick , Steve Oney , Jaclyn Cohen- 4.8
Approx. 31 hours to complete
You’ll also learn about Python’s sorted function and how to control the order in which it sorts by passing in another function as an input. It covers chapters 10-16 of the textbook “Fundamentals of Python Programming,” which is the accompanying text (optional and free) for this course. Introduction to the Specialization...
Six Sigma Tools for Improve and Control
by Christina Scherrer, PhD , David Cook, PhD , Gregory Wiles, PhD , Bill Bailey, PhD- 4.8
Approx. 9 hours to complete
Also, it is a highly recommended text for those wishing to move forward in Six Sigma and eventually gain certification from professional agencies such as American Society for Quality (ASQ). Use of Regression for Prediction Regression for Six Sigma Regression for Six Sigma - Recommended Reading CAPSTONE PROJECT FOR COMPLETION OF YELLOW BELT SPECIALIZATION...
Imagery, Automation, and Applications
by Nick Santos- 4.9
Approx. 28 hours to complete
Welcome to the last course of the specialization (unless your continuing on to the capstone project, of course!). At the end of this week, you'll be able to find and download satellite imagery online and use it for two common types of analysis: NDVI and trained classification. Polishing Models for Reuse...
Teaching Impacts of Technology: Data Collection, Use, and Privacy
by Beth Simon- 4.6
Approx. 13 hours to complete
In this course you’ll focus on how constant data collection and big data analysis have impacted us, exploring the interplay between using your data and protecting it, as well as thinking about what it could do for you in the future. Impacts (What could my data do for me in the future?...
Wharton Business and Financial Modeling Capstone
by Richard Lambert , Robert W. Holthausen , Don Huesman , Richard Waterman- 4.6
Approx. 12 hours to complete
Using a data set designed by Wharton Research Data Services (WRDS), you will implement quantitative models in spreadsheets to identify the best opportunities for success and minimizing risk. Wharton Research Data Services (WRDS) is the leading data research platform and business intelligence tool for over 30,000 corporate, academic, government and nonprofit clients in 33 countries....
Bug Bounty - Web Application Penetration Testing Bootcamp
by We Secure © Training & Consultancy- 0.0
11 hours on-demand video
Bug bounty hunting is the newly emerging and trending role in cybersecurity that allows freehand security professionals to assess the application and platform security of an organization in vision to identify bugs or vulnerabilities. Cybersecurity in the real world Bug bounty hunting and OWASP fundamentals Cross-Site Scripting (XSS) for pentesting web applications...
$14.99