Filter by
The language used throughout the course, in both instruction and assessments.
Results for "secure smart contracts"
Coursera Project Network
Skills you'll gain: Virtual Machines, Virtual Private Networks (VPN), Cloud Security, Public Cloud, Amazon Web Services, Scalability, Private Cloud, Cloud Platforms, Cloud Computing, Cloud Infrastructure, Cloud Services, Infrastructure As A Service (IaaS)
University of Colorado System
Skills you'll gain: Intrusion Detection and Prevention, Threat Detection, Incident Response, Cybersecurity, Threat Management, Data Security, Cyber Attacks, Information Systems Security, Malware Protection, Distributed Denial-Of-Service (DDoS) Attacks, Endpoint Security, Network Security, Cyber Security Assessment, Firewall
Skills you'll gain: IT Security Architecture, Package and Software Management, IT Infrastructure, Network Troubleshooting, Systems Administration, Computer Networking, Infrastructure Security, Encryption, Data Security, Desktop Support, Network Security, Routing Protocols, TCP/IP, Lightweight Directory Access Protocols, Microsoft Windows, Technical Support, Active Directory, Software Installation, Computer Hardware, End User Training and Support
University of Pittsburgh
Skills you'll gain: Home Health Care, Network Protocols, Wireless Networks, Disabilities, End User Training and Support, Internet Of Things, Technology Solutions, Activities of Daily Living (ADLs), Caregiving, Health Assessment, Usability, Automation, Information Privacy, Security Awareness, Computing Platforms
- Status: Free
Campus BBVA
Skills you'll gain: Incident Response, Computer Security Incident Management, Cybersecurity, Cyber Attacks, Security Management, Security Information and Event Management (SIEM), Information Systems Security, Data Security, Incident Management, Cyber Threat Intelligence, Application Security, Computer Security Awareness Training, Intrusion Detection and Prevention, Information Technology Operations, Threat Management, Security Controls, Threat Detection, Malware Protection, Loss Prevention, Continuous Monitoring
University of Minnesota
Skills you'll gain: Open Web Application Security Project (OWASP), Cloud Security, Authorization (Computing), Cyber Risk, Authentications, Continuous Monitoring, Threat Management, Security Controls, Application Security, Cybersecurity, Cyber Attacks, Secure Coding, Cryptography, Security Testing, Data Security, Identity and Access Management, Vulnerability Management, Infrastructure Security
- Status: Free
Skills you'll gain: Cloud Computing Architecture, Cloud Security, Cloud Infrastructure, Cloud Computing, Cloud Applications, IT Security Architecture, Cloud Services, Infrastructure Security, Application Security, Data Security, Cybersecurity, Security Controls, Risk Management Framework, Encryption
Johns Hopkins University
Skills you'll gain: Anomaly Detection, Generative AI, Intrusion Detection and Prevention, Malware Protection, Cyber Threat Hunting, Cybersecurity, Threat Detection, Cyber Threat Intelligence, Feature Engineering, Network Analysis, Cyber Attacks, Threat Modeling, Email Security, Security Engineering, System Design and Implementation, Network Security, Jupyter, Authentications, Deep Learning, Machine Learning Software
Skills you'll gain: Google Cloud Platform, Unstructured Data, MLOps (Machine Learning Operations), Tensorflow, Applied Machine Learning, Big Data, Cloud API, Jupyter, Machine Learning, Natural Language Processing, Artificial Intelligence
- Status: Free
UNSW Sydney (The University of New South Wales)
Skills you'll gain: Design Thinking, Solution Design, Business Transformation, Workforce Development, Strategic Thinking, Automation, Digital Transformation, Human Centered Design, Emerging Technologies, Adaptability, Innovation, Service Design, Business Process Automation, Forecasting, Process Analysis, Leadership
Infosec
Skills you'll gain: Secure Coding, Computer Programming Tools, C++ (Programming Language), Software Development Tools, Code Review, C (Programming Language), Debugging
Skills you'll gain: IT Security Architecture, Security Controls, Cryptography, Security Engineering, Application Security, Vulnerability Assessments, Information Systems Security, Vulnerability Management, Secure Coding, Encryption, Cybersecurity, Infrastructure Security, Computer Security, Threat Modeling, Public Key Infrastructure, Data Security, Authentications, Data Integrity
Searches related to secure smart contracts
In summary, here are 10 of our most popular secure smart contracts courses
- Create a Virtual Private Cloud (VPC) Using AWS:Â Coursera Project Network
- Detecting and Mitigating Cyber Threats and Attacks:Â University of Colorado System
- IT-поддержка Google: Google
- Mainstream Smart Home Technology as Assistive Technology:Â University of Pittsburgh
- Cybersecurity for Tech Professionals:Â Campus BBVA
- Cloud Top Ten Risks:Â University of Minnesota
- Certified Cloud Security Professional (CCSP):Â Infosec
- AI for Cybersecurity:Â Johns Hopkins University
- Smart Analytics, Machine Learning, and AI on GCP en Español: Google Cloud
- Designing the Future of Work:Â UNSW Sydney (The University of New South Wales)