computer security

  1. Coursera

    Coursera ($) Access Controls

    Overview Welcome to Access Controls! The Access Controls Course provides information pertaining to specify what users are permitted to do, the resources they are allowed to access, and what operations they are able to perform on a system. Access Controls help managers limit and monitor systems...
  2. Coursera

    Coursera ($) Security Operations and Administration

    Overview Security operations and administration is the task of identifying an organization's information assets and the documentation needed for policy implementation, standards, procedures, and guidelines to ensure confidentiality, integrity, and availability. You will understand the process...
  3. Coursera

    Coursera ($) Identifying, Monitoring, and Analyzing Risk and Incident Response and Recovery

    Overview Risk Identification, Monitoring, and Analysis: In the Risk Identification, Monitoring, and Analysis session, you will learn how to identify, measure, and control losses associated with adverse events. You will review, analyze, select, and evaluate safeguards for mitigating risk.You will...
  4. Coursera

    Coursera ($) Cryptography

    Overview Welcome to Cryptography! Cryptography is the practice and study of techniques for securing communications in the presence of third parties. You will learn how to protect information in order to ensure its integrity, confidentiality, authenticity, and non-repudiation. You will come out...
  5. Coursera

    Coursera ($) Networks and Communications Security

    Overview Welcome to Networks and Communications Security Course! In the Networks and Communications Security Course, you will learn about the network structure, data transmission methods, transport formats, and the security measures used to maintain integrity, availability, authentication, and...
  6. Coursera

    Coursera ($) Systems and Application Security

    Overview Welcome to Systems and Application Security Course! In the Systems and Application Security Course, you will gain an understanding of computer code that can be described as harmful or malicious. Both technical and non-technical attacks will be discussed. You will learn how an...
  7. Coursera

    Coursera Introduction to Cybersecurity for Business

    Overview The world runs computers. From small to large businesses, from the CEO down to level 1 support staff, everyone uses computers. This course is designed to give you a practical perspective on computer security. This course approaches computer security in a way that anyone can understand...
  8. Coursera

    Coursera Cyber Threats and Attack Vectors

    Overview Data breaches occur nearly every day. From very large retailers, down to your fantasy football website, and anywhere in between, they have been compromised in some way. How did the attackers get in? What did they do with the data they compromised? What should I be concerned with in my...
  9. Coursera

    Coursera Detecting and Mitigating Cyber Threats and Attacks

    Overview Computer attacks and data breaches are inevitable. It seems like every day a data breach occurs and the victims of the data breach suffer. Their information is stolen or posted online. The company’s or businesses who had the breach go on, learn a little from the attack, and just give...
  10. Coursera

    Coursera Proactive Computer Security

    Overview I’ve heard this before – “I’m not sure my computer security practices are working”. I reply “Have you tested them?” This course is the fourth and final course in the Practical Computer Security specialization. In this course, you’ll learn how to proactively test what you have put in...
  11. Coursera

    Coursera IT Security: Defense against the digital dark arts

    Overview This course covers a wide variety of IT security concepts, tools, and best practices. It introduces threats and attacks and the many ways they can show up. We’ll give you some background of encryption algorithms and how they’re used to safeguard data. Then, we’ll dive into the three As...
  12. Coursera

    Enterprise System Management and Security

    Overview The world runs on computers. Your watch, your TV, your car. You might be familiar on how to operate each of these. Your home computer you are even more familiar with operating it. But what does it take to really take computer systems to the next level? - The enterprise level. In this...
  13. Coursera

    Windows Server Management and Security

    Overview Microsoft Windows has been at the forefront of enterprise computing for several decades. What most office workers see is the desktop side – such as Windows 7, 8 or 10. This course explores what it takes to design and build the server side of Windows in an enterprise environment. This...
  14. Coursera

    Linux Server Management and Security

    Overview Whether you are accessing a bank website, Netflix or your home router, chances are that your computer is interacting with a Linux system. The world runs on Linux. In this course, we will dive into how Linux works from an enterprise perspective. In week 1 we will look at what Linux is...
  15. Coursera

    Planning, Auditing and Maintaining Enterprise Systems

    Overview Good system management not only requires managing the systems themselves, but requires careful planning to make systems interact with each other, auditing of the systems once the systems are built, and proactive maintenance of all systems. Organizations also rely on organizational...
  16. Coursera

    Coursera Networking and Security Architecture with VMware NSX

    Overview This 8 week online course equips learners with the basics of network virtualization with VMware NSX. To get the most of this course, you should have familiarity with generic IT concepts of routing, switching, firewalling, disaster recovery, business continuity, cloud and security. At...
  17. edX

    edX Cloud Computing Security

    Overview How do you protect the critical data that is increasingly being stored in the cloud? Learn how to build a security strategy that keeps data safe and mitigates risk. In this course, part of the Cloud Computing MicroMasters program, you will be introduced to industry best practices for...
  18. Coursera

    Internet History, Technology, and Security

    Overview The impact of technology and networks on our lives, culture, and society continues to increase. The very fact that you can take this course from anywhere in the world requires a technological infrastructure that was designed, engineered, and built over the past sixty years. To function...
Top