E.g., Wednesday, March 4, 2015
E.g., Wednesday, March 4, 2015
E.g., Wednesday, March 4, 2015
Self Paced

This course is an introduction to game theory & strategic thinking.

6.66667
Average: 6.7 (3 votes)
Self Paced

The course is designed to help you communicate with Egyptian Arabic in several basic situations, to enable you to exchange common courtesies that are essential in Egypt & Arabic countries. The course is divided into 12 modules(48 Lessons), plus a student guide & cumulative glossary.

0
No votes yet
Self-Paced

Student-centered education policies have little chance to succeed without the support of parents, educators, business leaders and community members. How we talk about reform, how we deliver our messages, and with whom we communicate will make a big difference when it comes to winning the education reform conversation. In this self-paced course, participants will build their communications skills related to media relations, targeted messaging, and the use of social media.

0
No votes yet
Self Paced

Data is essential for improving outcomes for students. Whether it is informing improved instruction, empowering parents and communities, or helping policymakers make decisions and target resources, our education system needs data in order to continuously improve. In order to create a culture of trust that enables effective data use, policymakers and education professionals must ensure that the public has confidences that state and local leaders act to protect student data privacy. This self-paced course will discuss the value data brings to improve education, offer recommendations for addressing privacy concerns while promoting effective data use, and explore lessons learned from existing and emerging policies in education and other sectors.

0
No votes yet
Self-Paced

By introducing problems that chemical engineers are asked to solve and exploring the reasons why the enabling sciences are required to solve them, participants will gain a better understanding of the underlying disciplines supporting the work in chemical engineering.

0
No votes yet
Self Paced

Mining underpins most of our technology and industries as well as modern society in general. A successful mine should be run efficiently and responsibly from exploration through to closure, with sound economic management every step of the way. In this course you’ll examine the business aspect of mining, focusing on the life cycle of a gold mine and discovering the technical and economic issues that affect the exploration, planning, operation and closure of a large-scale mining project.

0
No votes yet
Self Paced

Stop faking it, and unleash the true power of JavaScript. This course aims to get you started on the path toward JavaScript mastery. You will learn how to: create code that can make basic decisions; employ efficient debugging techniques with browser developer tools; access and modify HTML elements and CSS styles on a page; and use JavaScript to communicate with a server. This course will also introduce you to the rapidly growing world of JavaScript Libraries, and you'll get a chance to create a sample application with Backbone.js.

0
No votes yet
Self Paced

As the amount of cyber threats continue to grow, so does the Cyber Security industry. The need for capable ethical hackers is a global need. Ethical hackers are “white-hat” hackers (aka the good guys) that penetrate secured systems to highlight flaws and weaknesses in a system. They help government agencies, private businesses and public organizations identify what is secure and what needs to be fixed. If the idea of hacking as a career excites you, you’ll benefit greatly from completing Penetration Testing and Ethical Hacking training here on Cybrary.

0
No votes yet
Self Paced

Aggressive systems require aggressive hackers. Advanced Penetration Testing training embodies that notion. It’s an intense approach to the world of exploitation and pentesting set in the highest security environments around. In our free online Advanced Penetration Testing training class, you’ll learn how to challenge traditional practices and use alternate methods and software in penetration testing.

0
No votes yet
Self Paced

As the name implies, Post Exploitation Hacking – Persistence and Continued Access, refers to the series of steps to be followed after breaking into a system. Offensive hacking to accomplish an objective requires ultimate stealth—but unfortunately many hackers (both script-kiddies and experienced professionals) sometimes fail to perform acts that conceal their identity and exploit their target covertly and consistently for intelligence and to accomplish the mission. In this free self-paced online training course, you’ll cover three main topics: Information Gathering, Backdooring and Covering Steps.

0
No votes yet
Self Paced

CISSP is the basis of advanced information assurance knowledge for IT professionals. Often referred to as the “gold standard” of security certifications, CISSP is one of the most important distinctions an IT professional can have on their resume. And it’s for good reason too: a CISSP certification verifies one has mastery of a multitude of information assurance and cyber security topics, something that’s necessary for IT management and leadership (a job that many CISSP holders fulfill). Our free online CISSP training covers topics ranging from operations security, telecommunications, network and internet security, access control systems and methodology and business continuity planning.

0
No votes yet
Self Paced

For IT professionals looking to enhance their security skills in areas such as enterprise security, risk management, integrating computing and research and analysis, CASP training is ideal. The CASP certification validates one’s knowledge of advanced security concepts and proves that an individual is capable of the critical thinking necessary to develop effective solutions. In our free online CompTIA CASP training, you’ll learn how to integrate advanced authentication, how to manage risk in the enterprise, how to conduct vulnerability assessments and how to analyze network security concepts and components.

0
No votes yet
Self Paced

Digital crime is more prevalent than ever, and the attacks are getting highly complex. Security software can’t pinpoint it—the eyes and expertise of a trained professional is necessary. Our free Computer and Hacking Forensics training teaches you how to become that professional.

0
No votes yet
Self Paced

This Course covers the overview to Software Testing and the various types of Testing.

0
No votes yet
Self Paced

The Cisco Certified Networking Associate (CCNA) certification is the perfect starting point for emerging network engineers looking to enhance their foundational networking knowledge. Our free, self-paced CCNA training teaches students to install, configure, troubleshoot and operate LAN, WAN and dial access services for medium-sized networks.

0
No votes yet
Self Paced

Cloud security is a rapidly growing industry, as more and more companies rush to place their data and services “in the cloud”. While cloud computing alleviates the need for additional software and system hardware expansion, it also raises the issue of security. Who’s guarding the cloud? And how do you know your data is safe?  Our free online CompTIA Cloud+ training answers those same questions.

0
No votes yet
Self Paced

CompTIA’s Security+ certification has long been a top choice for those looking for their introduction into the cyber security industry—it provides the foundational knowledge for securing a network and managing risk. It also is approved by the U.S Department of Defense to meet information assurance technical and management certification requirements, so it’s a pretty huge distinction and in great demand. The certification will help people enter into the cyber security field, and will validate a fundamental cyber security skill set.

0
No votes yet
Self Paced

What is Cryptography and how does it work? In this course, you will examine how cryptography is the cornerstone of security technologies, and how through its use of different encryption methods, such as ciphers, and public or private keys, you can protect private or sensitive information from unauthorized access.

0
No votes yet
Self Paced

An advanced first aid course covering medical conditions and traumatic injuries.

8
Average: 8 (1 vote)

Pages

 

Tell your friends: