Security

Sort options

Cybersecurity Risk Management (edX)

Learn key principles of risk analysis, risk assessment and risk mitigation for information security using both qualitative and quantitative methodologies. Cybersecurity risk management guides a growing number of IT decisions. Cybersecurity risks continue to have critical impacts on overall IT risk modeling, assessment and [...]
2
Average: 2 ( 3 votes )

Cybersecurity Fundamentals (edX)

Learn cybersecurity fundamentals, including how to detect threats, protect systems and networks, and anticipate potential cyber attacks. In this introduction to the field of computing security, you will be given an extensive overview of the various branches of computing security. You will learn cybersecurity concepts, issues, and tools that [...]
3
Average: 3 ( 3 votes )

The Rooseveltian Century (Coursera)

Nov 22nd 2021
The Rooseveltian Century (Coursera)
Course Auditing
Categories
Effort
Languages
This course uses the lives, ideals and achievements of Theodore, Franklin, and Eleanor Roosevelt to create the idea of a Rooseveltian century. It is about doing research, analyzing primary sources, and connecting all this information with a coherent and logical interpretation. It is an invitation to think critically and [...]
10
Average: 10 ( 4 votes )

Data Privacy Fundamentals (Coursera)

This course is designed to introduce data privacy to a wide audience and help each participant see how data privacy has evolved as a compelling concern to public and private organizations as well as individuals. In this course, you will hear from legal and technical experts and practitioners who [...]
0
No votes yet

Secure your Cloud Data (Coursera)

Azure was designed for security and compliance. In this course, you will learn how to leverage the built-in services to store your app data securely to ensure that only authorized services and clients have access to it. This course will help you prepare for the Microsoft Certified: Azure Developer [...]
0
No votes yet

Securing Linux Systems (Coursera)

Oct 25th 2021
Securing Linux Systems (Coursera)
Course Auditing
Categories
Effort
Languages
In this course, we look at security and the Linux operating system. The course material is a good for anyone preparing for the Linux Foundation Certified IT Associate (LFCA) exam or just interested in learning more about Linux. This course is the third course in a series that aims [...]
0
No votes yet

Leadership (Coursera)

Oct 25th 2021
Leadership (Coursera)
Course Auditing
Categories
Effort
Languages
This course is an introduction and an overview to the basic principles of cybersecurity leadership and management. It explores and dissects the correlation between security, trust and stability (STS) and the Confidentiality, Integrity and Availability CIA Triad, while integrating information security governance (ISG) and the McKinsey 7S Change [...]
0
No votes yet
Oct 25th 2021
Course Auditing
41.00 EUR

Seguridad informática: defensa contra las artes oscuras digitales (Coursera)

Este curso cubre una amplia variedad de conceptos, herramientas y mejores prácticas de seguridad de TI. Introduce amenazas y ataques, y las muchas formas en que pueden aparecer. Te daremos algunos antecedentes de algoritmos de cifrado y cómo se utilizan para salvaguardar los datos. Luego, nos sumergiremos en los [...]
0
No votes yet

Segurança de TI: defesa contra as artes negras digitais (Coursera)

Este curso abrange uma grande variedade de conceitos, ferramentas e práticas recomendadas ao nível da segurança de TI. Aborda ameaças e ataques e as várias formas através das quais podem surgir. Vamos fornecer-lhe algumas informações gerais sobre o que são os algoritmos de encriptação e como são utilizados para [...]
0
No votes yet

Check Point Jump Start: Harmony Endpoint Security (Coursera)

Harmony Endpoint is a complete solution that protects the remote workforce from today’s complex threat landscape. It prevents the most imminent threats to the endpoint such as ransomware, phishing, or drive-by malware, while quickly minimizing breach impact with autonomous detection and response.
0
No votes yet