Security

 

 


 

Customize your search:

E.g., 2017-08-18
E.g., 2017-08-18
E.g., 2017-08-18
Aug 21st 2017

Security and safety challenges rank among the most pressing issues of modern times. Challenges such as, cyber-crime, terrorism, and environmental disasters impact the lives of millions across the globe. These issues also rank high on the agenda of politicians, international organizations and businesses. They also feature prominently in the public conscience and in governmental policies.

No votes yet
Aug 21st 2017

This course takes a look at the future of cybersecurity with respect to what is being done to lessen the potential for catastrophic destruction resulting from cyber attack on critical infrastructure. In this respect, we take a short survey of potential technological solutions and response options. We conclude this module by taking a look at unique aspects of the cyber profession and personal considerations for those who want to make cybersecurity a career.

Average: 5.5 (2 votes)
Aug 21st 2017

G Suite Administrator Fundamentals serves as the starting place for any new G Suite admin as they begin their journey of managing and establishing G Suite best practices for their organization. This 15-30 hour accelerated one week course will leave you feeling confident to utilize the basic functions of the Admin Console to manage users, control access to services, configure common security settings, and much more.

Average: 6 (2 votes)

Aug 21st 2017

This course is for you if you are interested in transitioning toward a managerial role in cybersecurity and mobility. Through interviews with industry experts in this area, you will learn about innovations powering the rapid spread of information technology and how they present new challenges for protecting data.

Average: 5.5 (8 votes)
Aug 21st 2017

In this course you will explore information security through some introductory material and gain an appreciation of the scope and context around the subject. This includes a brief introduction to cryptography, security management and network and computer security that allows you to begin the journey into the study of information security and develop your appreciation of some key information security concepts.

No votes yet
Aug 21st 2017

What is the X-Factor? In Cybersecurity, the X-Factor related to unknown and unpredictable human behavior within and outside of your organization. “No one really knows why humans do what they do”, (David K. Reynolds), and because of this organizations can be unprepared for malicious, untrained, or even best intentioned behavior that can cause alarm and sometimes irreparable harm.

Average: 6.7 (6 votes)

Aug 21st 2017

This course focuses on how to design and build secure systems with a human-centric focus. We will look at basic principles of human-computer interaction, and apply these insights to the design of secure systems with the goal of developing security measures that respect human performance and their goals within a system.

Average: 5.8 (8 votes)
Aug 21st 2017

The nature of digital manufacturing and design (DM&D), and its heavy reliance on creating a digital thread of product and process data and information, makes it a prime target for hackers and counterfeiters. This course will introduce students to why creating a strong and secure infrastructure should be of paramount concern for anyone operating in the DM&D domain, and measures that can be employed to protect operational technologies, systems and resources.

Average: 4 (1 vote)
Aug 21st 2017

This course gives an introduction into the field of terrorism & counterterrorism studies. It will help you to analyze and understand these complex phenomena and discuss its impact on society with a global audience. Students, policy makers, journalists or anyone with a strong interest in understanding issues like the history, origins and nature of terrorism, security, fear management, resilience, politics, violence, foreign fighters and radicalization will find the course most relevant.

Average: 9 (12 votes)
Aug 21st 2017

This course we will explore the foundations of software security. We will consider important software vulnerabilities and attacks that exploit them -- such as buffer overflows, SQL injection, and session hijacking -- and we will consider defenses that prevent or mitigate these attacks, including advanced testing and program analysis techniques. Importantly, we take a "build security in" mentality, considering techniques at each phase of the development cycle that can be used to strengthen the security of software systems.

Average: 3.1 (8 votes)
Aug 21st 2017

Welcome to Course 1 in CS4950, Homeland Security and Cybersecruity. In this course we examine the origins of homeland security and its co0nnection with cybersecurity. Homeland security is about safeguarding the United States from domestic catastrophic destruction. Catastrophic destruction comes in two forms: natural and manmade.

Average: 7 (1 vote)

Self Paced

Basic concepts of operating systems and system programming. Utility programs, subsystems, multiple-program systems. Processes, interprocess communication, and synchronization. Memory allocation, segmentation, paging. Loading and linking, libraries. Resource allocation, scheduling, performance evaluation. File systems, storage devices, I/O systems. Protection, security, and privacy.

No votes yet