Filter by
SubjectRequired
LanguageRequired
The language used throughout the course, in both instruction and assessments.
Learning ProductRequired
LevelRequired
DurationRequired
SkillsRequired
SubtitlesRequired
EducatorRequired
Results for "security "
Google
Skills you'll gain: Package and Software Management, IT Infrastructure, Network Security, Network Troubleshooting, Systems Administration, OS Process Management, Computer Networking, Desktop Support, Information Systems Security, Computer Security Awareness Training, Application Security, TCP/IP, Cybersecurity, Remote Access Systems, Network Administration, Technical Support, Active Directory, Server Administration, Computer Hardware, Information Technology
Kennesaw State University
Skills you'll gain: Cyber Governance, Cyber Security Policies, Contingency Planning, Risk Management, Cyber Security Strategy, Security Management, Cybersecurity, Governance, Information Technology, Staff Management, Proposal Development, Organizational Structure, Presentations
Skills you'll gain: Malware Protection, Cyber Threat Hunting, Application Security, Cybersecurity, Threat Detection, Virtual Machines, Code Review, Debugging, System Programming, Windows PowerShell, Virtualization, Operating Systems, Programming Principles, Computer Architecture, Linux
- Status: Free
Lund University
Skills you'll gain: Artificial Intelligence, Machine Learning, Social Justice, Algorithms, Socioeconomics, Diversity Awareness, Ethical Standards And Conduct, Automation, Information Privacy, Political Sciences, Security Controls, Governance, Law, Regulation, and Compliance
University of London
Skills you'll gain: Computer Science, Computer Systems, Web Applications, Computer Networking, Computational Thinking, Debugging, Usability, Cybersecurity, Software Architecture, Network Protocols, Databases
University of Pennsylvania
Skills you'll gain: Data Ethics, Data Governance, Data Security, Governance, Business Strategy, Organizational Strategy, Business Transformation, Artificial Intelligence, Business Ethics, Analytics, Big Data, Machine Learning, Innovation, Algorithms
University of Colorado System
Skills you'll gain: Local Area Networks, Network Protocols, Computer Networking, Network Architecture, TCP/IP, Network Performance Management, Wireless Networks, Data Integrity
Skills you'll gain: Robotic Process Automation, Web Scraping, User Interface (UI), Business Process Automation, Automation, Email Security, UI Components, Test Automation, User Interface (UI) Design, Data Import/Export, Excel Macros, Scripting, IT Automation, Data Cleansing, Software Development Tools, Data Integration, Integrated Development Environments, Unstructured Data, Application Deployment, Configuration Management
- Status: Free
University of London
Skills you'll gain: Cryptography, Application Security, Cybersecurity, Data Security, Encryption, Vulnerability Assessments, Key Management, Public Key Cryptography Standards (PKCS), Network Security, Authentications, Mobile Security, Data Integrity, Algorithms
Skills you'll gain: Network Routing, Network Security, TCP/IP, Firewall, Google Cloud Platform, Network Administration, Virtual Private Networks (VPN), Network Architecture, Cloud Services, Load Balancing
- Status: Free
Yale University
Skills you'll gain: Political Sciences, Public Safety and National Security, Social Studies, Social Justice, Law, Regulation, and Compliance, Public Policies, Governance, Economics, Tax Laws
University of Illinois Urbana-Champaign
Skills you'll gain: Distributed Computing, File Systems, Cloud Computing, Transaction Processing, Network Security, Data Centers, Authorization (Computing), Apache Hadoop, Data Store, Authentications, Scalability, NoSQL, Algorithms, Encryption, Graph Theory
In summary, here are 10 of our most popular security courses
- Google IT Support: Google
- Road to the CISO – Culminating Project Course: Kennesaw State University
- Malware Analysis and Introduction to Assembly Language: IBM
- Artificial Intelligence: Ethics & Societal Challenges: Lund University
- How Computers Work: University of London
- AI Strategy and Governance: University of Pennsylvania
- Peer-to-Peer Protocols and Local Area Networks: University of Colorado System
- Robotic Process Automation (RPA): UiPath
- Introduction to Applied Cryptography: University of London
- Networking in Google Cloud: Routing and Addressing: Google Cloud