E.g., Saturday, August 29, 2015
E.g., Saturday, August 29, 2015
E.g., Saturday, August 29, 2015
Self Paced

In this course we will learn how to secure computer networks & clients from attack by learning the tools & tactics employed by computer Hackers.

0
No votes yet
Self Paced

The Cisco CCNA Security certification is one of the newest certifications offered by Cisco.

0
No votes yet
Self Paced

This course is the student foundation-level computer & network security skills & knowledge.

6
Average: 6 (1 vote)
Self Paced

For IT professionals looking to enhance their security skills in areas such as enterprise security, risk management, integrating computing and research and analysis, CASP training is ideal. The CASP certification validates one’s knowledge of advanced security concepts and proves that an individual is capable of the critical thinking necessary to develop effective solutions. In our free online CompTIA CASP training, you’ll learn how to integrate advanced authentication, how to manage risk in the enterprise, how to conduct vulnerability assessments and how to analyze network security concepts and components.

0
No votes yet
Self Paced

CISSP is the basis of advanced information assurance knowledge for IT professionals. Often referred to as the “gold standard” of security certifications, CISSP is one of the most important distinctions an IT professional can have on their resume. And it’s for good reason too: a CISSP certification verifies one has mastery of a multitude of information assurance and cyber security topics, something that’s necessary for IT management and leadership (a job that many CISSP holders fulfill). Our free online CISSP training covers topics ranging from operations security, telecommunications, network and internet security, access control systems and methodology and business continuity planning.

0
No votes yet
Self Paced

CompTIA’s Security+ certification has long been a top choice for those looking for their introduction into the cyber security industry—it provides the foundational knowledge for securing a network and managing risk. It also is approved by the U.S Department of Defense to meet information assurance technical and management certification requirements, so it’s a pretty huge distinction and in great demand. The certification will help people enter into the cyber security field, and will validate a fundamental cyber security skill set.

0
No votes yet
Oct 5th 2015

Our lives depend on online services. Gain essential cyber security knowledge and skills, to help protect your digital life.

10
Average: 10 (1 vote)
Aug 10th 2015

This course will introduce you to the foundations of modern cryptography, with an eye toward practical applications.

0
No votes yet
Aug 10th 2015

In this course, we will study security and trust from the hardware perspective. Upon completing the course, students will understand the vulnerabilities in current digital system design flow and the physical attacks to these systems. They will learn that security starts from hardware design and be familiar with the tools and skills to build secure and trusted hardware.

0
No votes yet
Aug 10th 2015

This course focuses on how to design and build secure systems with a human-centric focus. We will look at basic principles of human-computer interaction, and apply these insights to the design of secure systems with the goal of developing security measures that respect human performance and their goals within a system.

0
No votes yet
Aug 10th 2015

This course we will explore the foundations of software security. We will consider important software vulnerabilities and attacks that exploit them -- such as buffer overflows, SQL injection, and session hijacking -- and we will consider defenses that prevent or mitigate these attacks, including advanced testing and program analysis techniques. Importantly, we take a "build security in" mentality, considering techniques at each phase of the development cycle that can be used to strengthen the security of software systems.

0
No votes yet
Aug 17th 2015

Technology use among children and adolescents is growing at an astronomical rate. Think about how many parents purchase their children smartphones, gaming systems, iPads, or other digital devices. With access to the internet, these devices allow children to connect to other in ways we never could have imagined. With the proliferation of devices comes concerns regarding cyberbullying, screentime, digital citizenship, media literacy and exposure to inappropriate content. For parents, keeping up with their children's use of technology can be a daunting challenge. The question then becomes, what can parents do to help kids use these devices responsibility? When online, how can parents make sure their children are safe? What can parents do prevent the sharing of personally identifiable information? This course provides an introduction to strategies for successfully parenting in the digital age.

0
No votes yet
Jul 31st 2015

Learn about the inner workings of cryptographic primitives and how to apply this knowledge in real-world applications!

7
Average: 7 (1 vote)
Jul 29th 2015

This course introduces students to basic issues in mobile cloud security, malware, and secure client/server communication. Students will learn about security risks in Android and cloud services, threat mitigation strategies, secure coding practices, and tools for managing security of devices.

0
No votes yet
Jun 1st 2015

This course deals with international relations, peace and security and brings together a number of experts from the field and academia to share their perspectives. The course will help you gain insight into conflict resolution and the role organizations such as the United Nations Security Council, the European Union, the African Union and NATO play in a changing world.

10
Average: 10 (1 vote)
May 18th 2015

Today's fast moving information security field creates demand for industry professionals with up-to-the minute knowledge of the latest technologies, threats and remediation strategies to keep systems secure. The need has never been greater, with customer data, employee personal information, personal health information and digitized intellectual property under constant risk of cyberattack and exfiltration.

0
No votes yet
May 21st 2015

Dans notre société hyper informatisée, la protection des données est devenue un sujet central. Ce cours présente les règles applicables en matière de protection des données et de la vie privée sur internet.

0
No votes yet
May 21st 2015

Understand the competing tensions of laws related to privacy and national security, and the impending consequences of this battle for our networked world.

0
No votes yet

Pages

 

Tell your friends: