Search result for Cyber security us government Online Courses & Certifications
Get Course Alerts by Email
Industrial IoT Markets and Security
by David Sluiter- 4.7
Approx. 22 hours to complete
There is one exception: We will study security in some depth as this is the most important topic for all "Internet of Things" product development. Security Segment 1 - Introduction, The Security Mindset Segment 9 - Examples of Poor Security Implementations Segment 11 - Web Browsers, Security Certificates Segment 21 - US Security Standards, Summary...
C Programming Pointers - From ZERO To HERO!
by Vlad Budnitski- 5
7.5 hours on-demand video
- Cyber Security. Pointers can get us all confused to some extent....
$9.99
Understanding Wireless: Technology, Economics, and Policy
by Patricia L. Bellia , Barry Patrick Keating , J. Nicholas Laneman , Aaron Striegel- 0.0
6 Weeks
We regret that the competition is only available to students in the US and Canada at this time....
$50
Cryptography is more fun with R!
by Vladimir Zhbanko- 0.0
1.5 hours on-demand video
The main goal of this course is to create a way all of us can use open source encryption algorithm to keep and protect our secrets without using 'locked software'. Course developed by non security expert by explaining the practical use of OpenSSL software library in R Statistical Language....
$12.99
IT Security Fundamentals: CompTIA Security+ 2015
by LearnSmart LLC- 0.0
24.5 hours on-demand video
Welcome to IT Security Fundamentals: CompTIA Security+ 2015 from LearnSmart. Section 28: What kind of security measures do you take to protect your facilities, equipment, resources, personnel, and property from damage caused by unauthorized access? Section 33: Today’s threats and cyber intelligence have made it mandatory for us to use devices for protection....
$199.99
The Threat of Nuclear Terrorism
by William Perry- 0.0
5 Weeks
is the Douglas Dillon Professor of Government at Harvard’s Kennedy School and former Director of the Belfer Center for Science and International Affairs. Among his most influential publications are the critically acclaimed The Edge of Disaster: Rebuilding a Resilient Nation and the national bestseller America the Vulnerable: How Government is Failing to Protect Us From Terrorism....
$50
The Threat of Nuclear Terrorism
by William Perry- 0.0
5 Weeks
is the Douglas Dillon Professor of Government at Harvard’s Kennedy School and former Director of the Belfer Center for Science and International Affairs. Among his most influential publications are the critically acclaimed The Edge of Disaster: Rebuilding a Resilient Nation and the national bestseller America the Vulnerable: How Government is Failing to Protect Us From Terrorism....
$50
Related searches
Bitcoin: The Future of Money
by Joe Withrow- 4.5
3 hours on-demand video
"Lehman Brothers will file for bankruptcy this evening under circumstances that, without the government's assistance, sources tell us would almost certainly result in significant market disruption. government rushed in with a $700 billion bail-out package for banks it deemed "too big to fail". Discusses security concerns, as well as the importance of backing up your wallet....
$9.99
Epidemics, Pandemics and Outbreaks
by Elena A. Baylis , Elizabeth Ferrell Bjerke, JD , Amesh A. Adalja, MD, FACP , Ryan Morhard- 4.7
Approx. 13 hours to complete
How Does the Federal Government Promote Research and Development of New Drugs and Vaccines? Week 3: Global Health Security Do These Biodefense Programs Protect us Against Pandemics in Addition to Bioterrorism? Week 4 Video 2: What Authority Does the Government Have to Enact Laws Pertaining to Epidemics, Outbreaks and Pandemics? What is the New Global Health Security Agenda?...
Cybersecurity and Mobility
by Dr. Humayun Zafar, CEH, CISM, CRISC, PCIP- 4.5
Approx. 14 hours to complete
For example, mobile devices increase convenience but often bypass traditional security measures. Effective cybersecurity must be multi-dimensional and tiered, as threats can originate from virtually anywhere, target numerous levels of an organization, and sometimes persist for months or years before an information security staff is aware of an attack or breach....