E.g., Wednesday, April 22, 2015
E.g., Wednesday, April 22, 2015
E.g., Wednesday, April 22, 2015
Self Paced

CISSP is the basis of advanced information assurance knowledge for IT professionals. Often referred to as the “gold standard” of security certifications, CISSP is one of the most important distinctions an IT professional can have on their resume. And it’s for good reason too: a CISSP certification verifies one has mastery of a multitude of information assurance and cyber security topics, something that’s necessary for IT management and leadership (a job that many CISSP holders fulfill). Our free online CISSP training covers topics ranging from operations security, telecommunications, network and internet security, access control systems and methodology and business continuity planning.

0
No votes yet
Self Paced

For IT professionals looking to enhance their security skills in areas such as enterprise security, risk management, integrating computing and research and analysis, CASP training is ideal. The CASP certification validates one’s knowledge of advanced security concepts and proves that an individual is capable of the critical thinking necessary to develop effective solutions. In our free online CompTIA CASP training, you’ll learn how to integrate advanced authentication, how to manage risk in the enterprise, how to conduct vulnerability assessments and how to analyze network security concepts and components.

0
No votes yet
Self Paced

CompTIA’s Security+ certification has long been a top choice for those looking for their introduction into the cyber security industry—it provides the foundational knowledge for securing a network and managing risk. It also is approved by the U.S Department of Defense to meet information assurance technical and management certification requirements, so it’s a pretty huge distinction and in great demand. The certification will help people enter into the cyber security field, and will validate a fundamental cyber security skill set.

0
No votes yet
Self Paced Course - Start anytime

Technology use among children and adolescents is growing at an astronomical rate. Think about how many parents purchase their children smartphones, gaming systems, iPads, or other digital devices. With access to the Internet, these devices allow children to connect to others in ways we never could have imagined. With the proliferation of these devices comes concerns about cyberbullying, screentime, digital citizenship, media literacy, and exposure to inappropriate content. For parents, keeping up with their children's use of technology can be a daunting challenge.
So what can parents do to help kids use these devices responsibly? When online, how can parents make sure their children are safe? What can parents do prevent the sharing of personally identifiable information? These are just a few of the questions this course will attempt to explore.

0
No votes yet
Self Paced Course - Start anytime

In this course we will learn how to secure computer networks & clients from attack by learning the tools & tactics employed by computer Hackers.

0
No votes yet
Self Paced Course - Start anytime

The Cisco CCNA Security certification is one of the newest certifications offered by Cisco.

0
No votes yet
Self Paced Course - Start anytime

This course is the student foundation-level computer & network security skills & knowledge.

6
Average: 6 (1 vote)
Apr 20th 2015

Our lives depend on online services. Gain essential cyber security knowledge and skills, to help protect your digital life.

10
Average: 10 (1 vote)
Apr 27th 2015

Learn about traditional and mobile malware, the security threats they represent, state-of-the-art analysis and detection techniques, and the underground ecosystem that drives such a profitable but illegal business.

6
Average: 6 (1 vote)
Mar 2nd 2015

从操作系统与虚拟化平台面临的安全问题和应该采取的安全机制入手,帮助你学习和掌握计算机系统安全的基本理论、技术、方法和评测标准。Learn about operating systems, virtualization security issues, and related security theories, technologies, methods and evaluation criteria, as well as gain a deeper understanding of computer systems security.

2
Average: 2 (1 vote)
Apr 20th 2015

Learn about the inner workings of cryptographic primitives and how to apply this knowledge in real-world applications!

7
Average: 7 (1 vote)
Self Paced Course - Start anytime

A survey of more advanced stack-based memory corruption bugs (e.g. stack overflow), and how they lead to conditions that allow attackers to execute arbitrary code. The class also covers exploit mitigation technologies found in Microsoft Windows and how attackers bypass these techniques.

0
No votes yet
Self Paced Course - Start anytime

This class discusses stealth malware techniques used on Windows. Rootkits are a type of stealth malware that try to hide their presence, and this class shows the data structures they manipulate to achieve this.

0
No votes yet
Apr 13th 2015

Explore the impact and ethics of using drones, special ops units and private security firms, with this free online course.

0
No votes yet
Apr 6th 2015

In this course, we will study security and trust from the hardware perspective. Upon completing the course, students will understand the vulnerabilities in current digital system design flow and the physical attacks to these systems. They will learn that security starts from hardware design and be familiar with the tools and skills to build secure and trusted hardware.

0
No votes yet
Mar 9th 2015

This course provides an overview of the evolving field of cybersecurity, with an introduction to cybersecurity standards and law.

5.33333
Average: 5.3 (3 votes)
Self Paced Course - Start anytime

An introduction to Trusted Computing concepts, and a detailed look at what the Trusted Platform Module (TPM) can (and can't) do.

0
No votes yet
Self Paced Course - Start anytime

This class provides a distilled understanding of some OS mechanisms such as memory management, segmentation, paging, interrupts, and port IO. This knowledge is directly relevant for the future Rootkits and Advanced x86: Virtualization with Intel VT-x classes.

0
No votes yet

Pages

 

Tell your friends: