E.g., Wednesday, February 10, 2016
E.g., Wednesday, February 10, 2016
E.g., Wednesday, February 10, 2016
Self Paced

In this course we will learn how to secure computer networks & clients from attack by learning the tools & tactics employed by computer Hackers.

No votes yet
Self Paced

The Cisco CCNA Security certification is one of the newest certifications offered by Cisco.

Average: 6 (5 votes)
Self Paced

This course is the student foundation-level computer & network security skills & knowledge.

Average: 7 (4 votes)
Self Paced

CISSP is the basis of advanced information assurance knowledge for IT professionals. Often referred to as the “gold standard” of security certifications, CISSP is one of the most important distinctions an IT professional can have on their resume. And it’s for good reason too: a CISSP certification verifies one has mastery of a multitude of information assurance and cyber security topics, something that’s necessary for IT management and leadership (a job that many CISSP holders fulfill). Our free online CISSP training covers topics ranging from operations security, telecommunications, network and internet security, access control systems and methodology and business continuity planning.

No votes yet
Self Paced

For IT professionals looking to enhance their security skills in areas such as enterprise security, risk management, integrating computing and research and analysis, CASP training is ideal. The CASP certification validates one’s knowledge of advanced security concepts and proves that an individual is capable of the critical thinking necessary to develop effective solutions. In our free online CompTIA CASP training, you’ll learn how to integrate advanced authentication, how to manage risk in the enterprise, how to conduct vulnerability assessments and how to analyze network security concepts and components.

No votes yet
Self Paced

CompTIA’s Security+ certification has long been a top choice for those looking for their introduction into the cyber security industry—it provides the foundational knowledge for securing a network and managing risk. It also is approved by the U.S Department of Defense to meet information assurance technical and management certification requirements, so it’s a pretty huge distinction and in great demand. The certification will help people enter into the cyber security field, and will validate a fundamental cyber security skill set.

Average: 6 (1 vote)
Self Paced

In this class we are going to learn the basics of computer maintenance.

No votes yet
Self Paced

What is the Internet? How was it created? How does it work?

Average: 7.8 (6 votes)
Feb 8th 2016

Explore the impact and ethics of using drones, special ops units and private security firms, with this free online course.

Average: 3 (1 vote)
Feb 8th 2016

Hackern gelingt es immer wieder, Passwörter zu stehlen, auf sensible Firmen- und Userdaten zuzugreifen und somit schlimmstenfalls ganze Unternehmen lahmzulegen. So vielfältig die Möglichkeiten sind, die das Internet seinen Nutzern bietet, so vielfältig sind auch die Angriffspunkte und potenziellen Gefahren, die vom Internet ausgehen und vielen Menschen noch nicht richtig bewusst sind. In diesem openHPI-Kurs lernen Sie die Grundbegriffe der Internetsicherheit kennen. Warum ist das Internet in seinem Grunddesign unsicher? Welches sind die Schwachstellen des Internets und wie werden diese von Cyberkriminellen ausgenutzt? Diese Fragen werden unter anderem in diesem Kurs beantwortet. Gleichzeitig erhalten Sie einige Tipps, wie Sie sich vor solchen Angriffen schützen können.

No votes yet
Jan 4th 2016

Our lives depend on online services. Gain essential cyber security knowledge and skills, to help protect your digital life.

Average: 7 (9 votes)
Nov 9th 2015

This course will introduce you to the foundations of modern cryptography, with an eye toward practical applications.

Average: 4.3 (3 votes)
Nov 9th 2015

In this course, we will study security and trust from the hardware perspective. Upon completing the course, students will understand the vulnerabilities in current digital system design flow and the physical attacks to these systems. They will learn that security starts from hardware design and be familiar with the tools and skills to build secure and trusted hardware.

Average: 1.5 (2 votes)
Nov 9th 2015

This course focuses on how to design and build secure systems with a human-centric focus. We will look at basic principles of human-computer interaction, and apply these insights to the design of secure systems with the goal of developing security measures that respect human performance and their goals within a system.

Average: 6.3 (4 votes)
Nov 9th 2015

This course we will explore the foundations of software security. We will consider important software vulnerabilities and attacks that exploit them -- such as buffer overflows, SQL injection, and session hijacking -- and we will consider defenses that prevent or mitigate these attacks, including advanced testing and program analysis techniques. Importantly, we take a "build security in" mentality, considering techniques at each phase of the development cycle that can be used to strengthen the security of software systems.

Average: 3 (4 votes)
Oct 26th 2015

Learn about the inner workings of cryptographic primitives and how to apply this knowledge in real-world applications!

Average: 6.5 (2 votes)
Nov 10th 2015

En el curso se ofrecen los principales conceptos y características del régimen jurídico aplicable a la protección de los datos de carácter personal. En concreto, se presta una especial atención al contenido esencial del citado derecho según lo previsto en la Ley Orgánica de Protección de Datos (LOPD) así como en su normativa de desarrollo.

No votes yet
Sep 24th 2015

What is the danger of terrorism, and how can the world respond effectively?

Average: 8 (1 vote)
Aug 17th 2015

Technology use among children and adolescents is growing at an astronomical rate. Think about how many parents purchase their children smartphones, gaming systems, iPads, or other digital devices. With access to the internet, these devices allow children to connect to other in ways we never could have imagined. With the proliferation of devices comes concerns regarding cyberbullying, screentime, digital citizenship, media literacy and exposure to inappropriate content. For parents, keeping up with their children's use of technology can be a daunting challenge. The question then becomes, what can parents do to help kids use these devices responsibility? When online, how can parents make sure their children are safe? What can parents do prevent the sharing of personally identifiable information? This course provides an introduction to strategies for successfully parenting in the digital age.

No votes yet
Jul 29th 2015

This course introduces students to basic issues in mobile cloud security, malware, and secure client/server communication. Students will learn about security risks in Android and cloud services, threat mitigation strategies, secure coding practices, and tools for managing security of devices.

No votes yet

Pages

 

Tell your friends: