Security Vulnerabilities

Sort options

Cybersecurity Foundations for Risk Management (Coursera)

In order to manage the cybersecurity function business, you must first understand its language and its environment. This course covers the foundations of cybersecurity, including threats and vulnerabilities as well as the tools, technologies, and strategies used to manage it.
0
No votes yet

Identifying Security Vulnerabilities in C/C++Programming (Coursera)

This course builds upon the skills and coding practices learned in both Principles of Secure Coding and Identifying Security Vulnerabilities, courses one and two, in this specialization. This course uses the focusing technique that asks you to think about: “what to watch out for” and “where to look” [...]
0
No votes yet

Software Design Threats and Mitigations (Coursera)

The design step in developing software has some unique characteristics. First of all, it’s the only step where drawing pictures of things is the norm. Why is that? What do pictures do that other representations cannot do? Pictures have varying levels of detail; pictures have [...]
0
No votes yet

Identifying Security Vulnerabilities (Coursera)

This course will help you build a foundation of some of the fundamental concepts in secure programming. We will learn about the concepts of threat modeling and cryptography and you'll be able to start to create threat models, and think critically about the threat models created by other people. [...]
0
No votes yet

The Foundations of Cybersecurity (Coursera)

In order to manage the cybersecurity function business, you must first understand its language and its environment. This course covers the foundations of cybersecurity, including threats and vulnerabilities as well as the tools, technologies, and strategies used to manage it.
0
No votes yet

Cyber Threat Intelligence (Coursera)

This course gives you the background needed to gain Cybersecurity skills as part of the Cybersecurity Security Analyst Professional Certificate program. You will understand network defensive tactics, define network access control and use network monitoring tools. You will understand data protection risks and explore mobile endpoint protection. Finally you [...]
1
Average: 1 ( 3 votes )

Cyber Security Basics: A Hands-on Approach (edX)

Learn how to think like a hacker, but behave as a security expert. Are you tired of hearing that your computer has a virus? Or that your email account has been hacked? Now, is the time for you to protect yourself by understanding the basics of cyber security.
0
No votes yet

Cybersecurity for Critical Urban Infrastructure (edX)

Self Paced
Cybersecurity for Critical Urban Infrastructure (edX)
Course Auditing
Categories
Effort
Languages
Preparing city officials, agency staff and a new generation of students seeking to serve as cybersecurity consultants to understand, help prevent and manage cyberattacks on vulnerable communities across America.
0
No votes yet

Ciberseguridad. Bases y estructuras para la protección de la información (edX)

Self Paced
Ciberseguridad. Bases y estructuras para la protección de la información (edX)
Course Auditing
Categories
Effort
Languages
Sé capaz de blindar tu información y la de tu empresa contra las amenazas informáticas y conoce los fundamentos del fascinante mundo de la ciberseguridad. En la actualidad el acceso a las bases de datos, a las redes de computadoras y la información en la nube es esencial para [...]
0
No votes yet

Penetration Testing - Discovering Vulnerabilities (edX)

Learn fundamentals of penetration testing, including an Introduction to Penetration Testing Methodologies, Recognisance and Enumeration for Penetration Testers, Scanning and Vulnerability Enumeration. The class starts with an overview of penetration testing and the phases of a penetration test. The 1st phase is Scoping. In the scoping stage, the students [...]
0
No votes yet