Search result for Professional certificate in embedded systems Online Courses & Certifications
Get Course Alerts by Email
CISSP certification practice questions: Domain 3 & 4 - 2020
by Thor Pedersen | CISSP • PMP • CISM- 0.0
Security capabilities of information systems Web-based systems vulnerabilities Mobile systems vulnerabilities Embedded devices and cyber-physical systems vulnerabilities Prepare for the 2018 version of the Certified Information Systems Security Professional (CISSP) Certification Exam, which is what you will be tested on until the next CISSP curriculum update in 2021. ✔ Fast and friendly support in the Q&A section....
$12.99
Cybersecurity Capstone
by Bo Yuan , Jonathan S. Weissman , Yin Pan- 0.0
8 Weeks
Demonstrate the knowledge and skills acquired in the Cybersecurity MicroMasters Program. The Cybersecurity Capstone is specifically designed to provide a platform for verified learners to practice the hands-on cybersecurity skills and techniques studied in the courses of the RITx Cybersecurity MicroMasters program. basic systems and network services such as firewall, DNS, DHCP, Wireshark...
$600
Secure Software Development: Verification and More Specialized Topics
by David A. Wheeler- 0.0
7 Weeks
This is the third of the three courses in the Secure Software Development Fundamentals Professional Certificate program, and was developed by the Open Source Security Foundation (OpenSSF), a project of the Linux Foundation focused on securing the open source ecosystem. Security Verification: How to examine software, include some key tool types, and how to apply them in continuous integration (CI)....
$199
Preparing for Google Cloud Certification: Cloud Engineer Professional Certificate
- 0.0
Start your career in the cloud. This program provides the skills you need to advance your career in cloud architecture and provides a pathway to earn the industry-recognized Google Cloud Associate Cloud Engineer certification. Upon successful completion of this program, you will earn a certificate of completion to share with your professional network and potential employers....
Unlocking Information Security I: From Cryptography to Buffer Overflows
by Avishai Wool , Dan Gittik- 0.0
5 Weeks
Learn how systems are hacked and defended. In this course, which is the first part of the Unlocking Information Security program, you will learn the basic terminology and concepts in the field of information security. You will then combine everything you've learned and take a critical view of different authentication schemes: passwords, challenge-response systems and biometrics....
$149
Secure Software Development: Requirements, Design, and Reuse
by David A. Wheeler- 0.0
7 Weeks
This is the first of the three courses in the Secure Software Development Fundamentals Professional Certificate program, and was developed by the Open Source Security Foundation (OpenSSF), a project of the Linux Foundation focused on securing the open source ecosystem....
$199
Cybersecurity Capstone: Breach Response Case Studies
by IBM Security Learning Services- 4.8
Approx. 16 hours to complete
This course gives you the background needed to gain Cybersecurity skills as part of the Cybersecurity Security Analyst Professional Certificate program. This project will be graded by your peers in the course. In this course, you will learn to: The Cyber Kill Chain in PoS Breaches Emerging Trends in Ransomware...
Related searches
Operating Systems and You: Becoming a Power User
by Google Career CertificatesTop Instructor- 4.7
Approx. 35 hours to complete
In this course -- through a combination of video lectures, demonstrations, and hands-on practice -- you’ll learn about the main components of an operating system and how to perform critical tasks like managing software and users, and configuring hardware. List Directories in a GUI What’s happening in the background? Operating Systems in Practice...
Auditing II: The Practice of Auditing
by Mark E. Peecher, PhD, CPA- 4.8
Approx. 24 hours to complete
This course provides a continuation of the intensive conceptual and applied introduction to auditing in society begun in Auditing I: Conceptual Foundations of Auditing. Strategic Systems Auditing (SSA) Part 1 Strategic Systems Auditing (SSA) Part 2 Strategic Systems Auditing (SSA) Part 3 Strategic Systems Auditing (SSA) Part 4 Get Your Course Certificate...
Electronic Interfaces: Bridging the Physical and Digital Worlds
by Michel M. Maharbiz , Tom Zajdel- 0.0
8 Weeks
Learn by doing: analyze, design, and build electronic interfaces between sensors and a microcontroller to build a robot or your own creation in this hands-on lab course. Some mechanical components are required to complete the robot as presented in the course. Students interested in learning microcontroller programming should refer to UT Austinx’s Embedded Systems course....
$50