Learn about the inner workings of cryptographic primitives and protocols and how to apply this knowledge in real-world applications. A free textbook covering the material in the course is available at http://cryptobook.us. This course will launch once the textbook is complete.
This course is designed to introduce data privacy to a wide audience and help each participant see how data privacy has evolved as a compelling concern to public and private organizations as well as individuals. In this course, you will hear from legal and technical experts and practitioners who [...]
In this course, students will learn fundamental principles associated with the current cybersecurity landscape and identify concepts required to recognize and potentially mitigate attacks against enterprise networks as well as mission critical infrastructure. Students will also learn how to initially setup and configure security zones, authentication, and policies on [...]
Course 6: Cloud and Wireless Security. Welcome to course six. This course applies to security concepts, ideas, and considerations to two major changes that we have experienced in recent years. It's regarding the way we use the data.
Course 7: Incident Detection and Response. Welcome to course seven, Incident Detection and Response. Having an intruder inside your systems for months unnoticed by your systems, administrators, security specialists, and end-users is tantamount to giving the intruder, the keys to your business or organization. In many cases, organizations discover [...]
Course 8: Maturing Risk Management. In management science terms, maturing a process or practice means taking positive steps over time to make it more reliable, repeatable and efficient. In practice, this means getting better every day, while showing the measurements that demonstrate improvement and suggest other opportunities to improve. [...]
Welcome to Course Four. As we know, most attacks against systems involve exploiting vulnerabilities in software that powers hardware. Additionally, attackers may exploit vulnerabilities in the underlying hardware, especially when that hardware is for the protected against being stolen or accessed with unauthorized use, but their real target and [...]
This course is intended to provide a general introduction to key concepts in cyber security. It is aimed at anyone with a good general knowledge of information and communications technology. The nature, scope and importance of cyber security are explained, and key concepts are justified and explored. This includes [...]
Nossas boas-vindas ao Curso Integração e Cibersegurança entre os Sistemas de Informação. Neste curso, você aprenderá como os atores de um ecossistema de soluções e produtos digitais conseguem se conectar entre si, estabelecer um fluxo de informações que gere valor ao entregar ao cliente serviços de múltiplos fornecedores integrados. [...]
The ACP DevOps Engineer Course is designed for developers and operations experts who will be deploying applications on Alibaba Cloud using DevOps tools and best practices. The course covers Alibaba Cloud's Kubernetes Container Service (ACK), the ARMS Prometheus monitoring service, Log Service, ActionTrail, Container Registry, and more. It’s recommended [...]