Sep 22nd 2014

This course provides an overview of the evolving field of cybersecurity, with an introduction to cybersecurity standards and law.

3
Average: 3 (2 votes)
Aug 26th 2014

Learn to defend and protect vital company information using the latest technology and defense strategies. Analyze internal and external threats to proactively prevent information attacks. Gain experience by solving real-world problems and leave the class equipped to establish and oversee information security.

0
No votes yet
Aug 18th 2014

This course focuses on how to design and build secure systems with a human-centric focus. We will look at basic principles of human-computer interaction, and apply these insights to the design of secure systems with the goal of developing security measures that respect human performance and their goals within a system.

0
No votes yet
Self Paced Course - Start anytime

In this course we will learn how to secure computer networks & clients from attack by learning the tools & tactics employed by computer Hackers.

0
No votes yet
Jun 30th 2014

Learn about the inner workings of cryptographic primitives and how to apply this knowledge in real-world applications!

7
Average: 7 (1 vote)
May 19th 2014

This course deals with international relations, peace and security and brings together a number of experts from the field and academia to share their perspectives. The course will help you gain insight into conflict resolution and the role organizations such as the United Nations Security Council, the European Union, the African Union and NATO play in a changing world.

0
No votes yet
Self Paced Course - Start anytime

The Cisco CCNA Security certification is one of the newest certifications offered by Cisco.

0
No votes yet
Apr 28th 2014

Learn about traditional and mobile malware, the security threats they represent, state-of-the-art analysis and detection techniques, and the underground ecosystem that drives such a profitable but illegal business.

6
Average: 6 (1 vote)
Self Paced Course - Start anytime

This course is the student foundation-level computer & network security skills & knowledge.

6
Average: 6 (1 vote)
Feb 17th 2014

El curso pretende alcanzar los siguientes objetivos:
- Realizar una aproximación general al concepto, la historia y los tipos de redes sociales que existen.
- Aproximación jurídica al concepto de red social y las complejidades que la normativa actual plantea ante los retos de los usuarios en las redes sociales.
- Familiarizar al usuario acerca del concepto de privacidad y como manejar la misma en las principales redes sociales.
- Familiarizar al usuario con el concepto de propiedad intelectual, así como con los márgenes y límites a su ejercicio.

0
No votes yet
Jan 6th 2014

The Internet is a computer network that millions of people use every day. Understand the design strategies used to solve computer networking problems while you learn how the Internet works.

8
Average: 8 (3 votes)
Dec 4th 2013

Wild, wild web: Is the Internet a lawless no man’s land? Based on the recent public debate on data protection and massive privacy infringements, this course will explore the connection between cyber security and international human rights.

0
No votes yet
Oct 7th 2013

In this course, you'll learn what every citizen should know about the security risks--and future potential — of electronic voting and Internet voting.

0
No votes yet
Self Paced Course - Start anytime

A survey of more advanced stack-based memory corruption bugs (e.g. stack overflow), and how they lead to conditions that allow attackers to execute arbitrary code. The class also covers exploit mitigation technologies found in Microsoft Windows and how attackers bypass these techniques.

0
No votes yet
Self Paced Course - Start anytime

This class discusses stealth malware techniques used on Windows. Rootkits are a type of stealth malware that try to hide their presence, and this class shows the data structures they manipulate to achieve this.

0
No votes yet
Self Paced Course - Start anytime

An introduction to Trusted Computing concepts, and a detailed look at what the Trusted Platform Module (TPM) can (and can't) do.

0
No votes yet
Self Paced Course - Start anytime

This class provides a distilled understanding of some OS mechanisms such as memory management, segmentation, paging, interrupts, and port IO. This knowledge is directly relevant for the future Rootkits and Advanced x86: Virtualization with Intel VT-x classes.

0
No votes yet

Pages

 

Tell your friends: