Security Vulnerabilities

Sort options

Cybersecurity for Critical Urban Infrastructure (edX)

Self Paced
Cybersecurity for Critical Urban Infrastructure (edX)
Course Auditing
Categories
Effort
Languages
Preparing city officials, agency staff and a new generation of students seeking to serve as cybersecurity consultants to understand, help prevent and manage cyberattacks on vulnerable communities across America.
0
No votes yet

Ciberseguridad. Bases y estructuras para la protección de la información (edX)

Self Paced
Ciberseguridad. Bases y estructuras para la protección de la información (edX)
Course Auditing
Categories
Effort
Languages
Sé capaz de blindar tu información y la de tu empresa contra las amenazas informáticas y conoce los fundamentos del fascinante mundo de la ciberseguridad. En la actualidad el acceso a las bases de datos, a las redes de computadoras y la información en la nube es esencial para [...]
0
No votes yet

Identifying Security Vulnerabilities (Coursera)

This course will help you build a foundation of some of the fundamental concepts in secure programming. We will learn about the concepts of threat modeling and cryptography and you'll be able to start to create threat models, and think critically about the threat models created by other people. [...]
0
No votes yet

The Foundations of Cybersecurity (Coursera)

In order to manage the cybersecurity function business, you must first understand its language and its environment. This course covers the foundations of cybersecurity, including threats and vulnerabilities as well as the tools, technologies, and strategies used to manage it.
0
No votes yet

Identifying Security Vulnerabilities in C/C++Programming (Coursera)

This course builds upon the skills and coding practices learned in both Principles of Secure Coding and Identifying Security Vulnerabilities, courses one and two, in this specialization. This course uses the focusing technique that asks you to think about: “what to watch out for” and “where to look” [...]
0
No votes yet

Mitigating Security Vulnerabilities on Google Cloud Platform (Coursera)

Jul 26th 2021
Mitigating Security Vulnerabilities on Google Cloud Platform (Coursera)
Course Auditing
Categories
Effort
Languages
This self-paced training course gives participants broad study of security controls and techniques on Google Cloud Platform. Through recorded lectures, demonstrations, and hands-on labs, participants explore and deploy the components of a secure GCP solution, including Cloud Identity, the GCP Resource Manager, Cloud IAM, Google Virtual Private Cloud firewalls, [...]
0
No votes yet

Software Design Threats and Mitigations (Coursera)

The design step in developing software has some unique characteristics. First of all, it’s the only step where drawing pictures of things is the norm. Why is that? What do pictures do that other representations cannot do? Pictures have varying levels of detail; pictures have [...]
0
No votes yet

Penetration Testing - Discovering Vulnerabilities (edX)

Learn fundamentals of penetration testing, including an Introduction to Penetration Testing Methodologies, Recognisance and Enumeration for Penetration Testers, Scanning and Vulnerability Enumeration. The class starts with an overview of penetration testing and the phases of a penetration test. The 1st phase is Scoping. In the scoping stage, the students [...]
0
No votes yet

Information Security - Introduction to Information Security (edX)

Learn the fundamentals of information security, including Security Design Principles, Threat Modeling and Security Policy. This is a self-paced course that provides an introduction to information security and cybersecurity. Students gain a broad overview of Information Security and Privacy (ISP) through high-level ISP concepts. We discuss both traditional design [...]
0
No votes yet

Cyber Security Basics: A Hands-on Approach (edX)

Learn how to think like a hacker, but behave as a security expert. Are you tired of hearing that your computer has a virus? Or that your email account has been hacked? Now, is the time for you to protect yourself by understanding the basics of cyber security.
0
No votes yet