Managing cybersecurity is about managing risk, specifically the risk to information assets of valued...
University/Institute: University System of Georgia
In order to manage the cybersecurity function business, you must first understand its language and i...
University/Institute: University System of Georgia
This course allows you to show what you’ve learned in the previous IT Technical Support professional...
University/Institute: IBM
This second course of the Blockchain specialization will help you design, code, deploy and execute a...
University/Institute: The State University of New York
Welcome to course 1 of 5 of this Specialization, Security Principles. After completing this course,...
University/Institute: (ISC)²
Security operations and administration is the task of identifying an organization's information asse...
University/Institute: (ISC)²
This course gives you the background needed to gain Cybersecurity skills as part of the Cybersecurit...
University/Institute: IBM
Palo Alto Networks Cybersecurity Foundation Course Description: In this course, students will learn...
University/Institute: Palo Alto Networks
In this course -- through a combination of video lectures, demonstrations, and hands-on practice --...
University/Institute: Google
In this course, we will look at the OWASP organization and what its purpose is. We’ll dive into the...
University/Institute: Infosec
Welcome to course 4 of 5 of this Specialization, Network Security. In this course, we will look at c...
University/Institute: (ISC)²
Managing Google Workspace is the second course in the Google Workspace Administration series. This c...
University/Institute: Google Cloud
Most organizations plan for routine operations, but what happens when unexpected events overtake the...
University/Institute: University System of Georgia
This course is the first of a series that aims to prepare you for a role working as an information t...
University/Institute: LearnQuest
Today, we are faced with the increasing challenges of dealing with more aggressive and persistent th...
University/Institute: IBM
You use the Internet through your PC (Personal Computer), laptop, tablet, smartpad, and smartphone e...
University/Institute: Yonsei University
Introduction to Google Workspace Administration is the first course in the Google Workspace Administ...
University/Institute: Google Cloud
Most introductory or beginner level cybersecurity courses are not truly beginner level. Most of them...
University/Institute: Infosec
This course provides learners with a baseline understanding of common cyber security threats, vulner...
University/Institute: New York University
The purpose of this short four-week course is to introduce the topic of computer system security. We...
University/Institute: University of London