67 Computer Security and Networks Courses
Prepare for a new career in the high-growth field of cybersecurity, no degree or experience required. Get professional training designed and delivered by subject...
This specialization has been developed to help administrators master the foundations of establishing and managing Google Workspace for their organization.\n\nYou...
Google Workspace Administration 専門講座は、組織の管理者が Google Workspace のベストプラクティスを確立して管理するための基礎をマスターできるように作られています。\n\nこの講座で受講者は、新しい...
"「Google Workspace Security」は、Google Workspace Administration シリーズの 3 つ目のコースです。 このコースでは、ユーザーのパスワード...
This specialization is intended for technologically minded persons who are interested in getting to know the latest in ubiquitous computing, also known as "Internet...
In this course, we will study security and trust from the hardware perspective. Upon completing the course, students will understand the vulnerabilities in current...
This course builds upon the skills and coding practices learned in both Principles of Secure Coding and Identifying Security Vulnerabilities, courses one and two,...
Cryptography is an essential component of cybersecurity. The need to protect sensitive information and ensure the integrity of industrial control processes has placed...
What will you learn? Embedded Systems are so ubiquitous that some of us take them for granted: we find them in smartphones, GPS systems, airplanes, and so on. But...
In this first course of the specialization, we will discuss the limitations of the Internet for business and economic activity, and explain how blockchain technology...
This Specialization is intended for anyone seeking to learn basic computer skills. Through 3 courses, you will study computer hardware, software, and data safety....
This course provides learners with a baseline understanding of common cyber security threats, vulnerabilities, and risks. An overview of how basic cyber attacks...
Introduction to Cyber Security was designed to help learners develop a deeper understanding of modern information and system protection technology and methods. The...
In this case-based Specialization, you will be introduced to the field of cybersecurity through the world of security governance and risk management.\n\nThroughout...
This course provides students with the foundational knowledge required to work with the Junos operating system and to configure Junos devices. The course then delves...
In this course, you will learn about risk assessment techniques and how to implement a number of strategies that will ensure the protection of assets. You will learn...
In this 1-hour long project-based course, you will learn how to secure your information by encoding and decoding the messages. In this project, You’ll be able...
In this learning path, we will look at the OWASP organization and what its purpose is. We will then examine Broken Access Control, Cryptographic Failures, Injection...