Cyber Attacks

Sort options

Analítica avanzada y seguridad cibernética (edX)

La digitalización del sector energético brinda una gran oportunidad para alcanzar una matriz energética diversificada y sostenible. Sin embargo existen grandes retos por delante, los cuales pueden ser superados gracias a los avances en los sistemas de analítica avanzada. Por otra parte, la digitalización del sector energético requiere la [...]
0
No votes yet

Cybersecurity for Critical Urban Infrastructure (edX)

Self Paced
Cybersecurity for Critical Urban Infrastructure (edX)
Course Auditing
Categories
Effort
Languages
Preparing city officials, agency staff and a new generation of students seeking to serve as cybersecurity consultants to understand, help prevent and manage cyberattacks on vulnerable communities across America.
0
No votes yet

Palo Alto Networks Cybersecurity Foundation (Coursera)

In this course, students will learn fundamental principles associated with the current cybersecurity landscape and identify concepts required to recognize and potentially mitigate attacks against enterprise networks as well as mission critical infrastructure. Students will also learn how to initially setup and configure security zones, authentication, and policies on [...]
0
No votes yet

Ciberseguridad. Bases y estructuras para la protección de la información (edX)

Self Paced
Ciberseguridad. Bases y estructuras para la protección de la información (edX)
Course Auditing
Categories
Effort
Languages
Sé capaz de blindar tu información y la de tu empresa contra las amenazas informáticas y conoce los fundamentos del fascinante mundo de la ciberseguridad. En la actualidad el acceso a las bases de datos, a las redes de computadoras y la información en la nube es esencial para [...]
0
No votes yet

Cybersecurity Capstone: Breach Response Case Studies (Coursera)

This course gives you the background needed to gain Cybersecurity skills as part of the Cybersecurity Security Analyst Professional Certificate program. You will explore incident response methodologies and security models. You will learn to recognize and categorize key types of vulnerabilities and associated attacks against today's organizations. [...]
0
No votes yet

Introduction to Cybersecurity Tools & Cyber Attacks (Coursera)

This course gives you the background needed to understand basic Cybersecurity. You will learn the history of Cybersecurity, types and motives of cyber attacks to further your knowledge of current threats to organizations and individuals. Key terminology, basic system concepts and tools will be examined as an [...]
0
No votes yet

Homeland Security and Cybersecurity Future (Coursera)

This course takes a look at the future of cybersecurity with respect to what is being done to lessen the potential for catastrophic destruction resulting from cyber attack on critical infrastructure. In this respect, we take a short survey of potential technological solutions and response options. We [...]
10
Average: 10 ( 3 votes )

Manage the cyber threat for finance professionals (edX)

Self Paced
Manage the cyber threat for finance professionals (edX)
Course Auditing
Categories
Effort
Languages
In this course, we use scenarios/examples to examine the threat of a cyber-attack and good practices on mitigating the risk. This course is designed for accountancy, finance and business professionals working in all organisations from small business, large corporates or financial services or who are just interested in learning [...]
0
No votes yet

Real-Time Cyber Threat Detection and Mitigation (Coursera)

This course introduces real-time cyber security techniques and methods in the context of the TCP/IP protocol suites. Explanation of some basic TCP/IP security hacks is used to introduce the need for network security solutions such as stateless and stateful firewalls. Learners will be introduced to the techniques used [...]
0
No votes yet

Cyber Attack Countermeasures (Coursera)

This course introduces the basics of cyber defense starting with foundational models such as Bell-LaPadula and information flow frameworks. These underlying policy enforcements mechanisms help introduce basic functional protections, starting with authentication methods. Learners will be introduced to a series of different authentication solutions and protocols, including RSA SecureID [...]
4
Average: 4 ( 3 votes )