Information Technology > > Security

Calculus through Data & Modeling: Limits & Derivatives

This first course on concepts of single variable calculus will introduce the notions of limits of a...

University/Institute: Johns Hopkins University

Details Take This Course

Assessing and Improving Community Health

This course is intended to serve as an introduction to population health from both the vantage point...

University/Institute: University of Michigan

Details Take This Course

Personnel & Third-Party Security

In this course, you will learn all about the process of implementing effective education, training,...

University/Institute: University of California, Irvine

Details Take This Course

Introduction to Risk Management

In this course, you will learn about risk assessment techniques and how to implement a number of str...

University/Institute: University of California, Irvine

Details Take This Course

The Construction Industry: The Way Forward

This course provides an introduction on types of the construction projects as well as the main conce...

University/Institute: Columbia University

Details Take This Course

Security Governance & Compliance

Students are introduced to the field of cyber security with a focus on the domain of security & risk...

University/Institute: University of California, Irvine

Details Take This Course

Developing Cloud Apps with Node. js and React

In this course, you will focus on server-side JavaScript and frameworks. You will discover ways to m...

University/Institute: IBM

Details Take This Course

Cybersecurity Job Search and Interviews: Getting Started

Are you planning to have a career in cybersecurity? This course can help you plan your preparation f...

University/Institute: University System of Georgia

Details Take This Course

Healthcare Data Security, Privacy, and Compliance

In the final course of the Healthcare IT Support program, we will focus on the types of healthcare d...

University/Institute: Johns Hopkins University

Details Take This Course

Introduction to AWS Identity and Access Management

Security should be your first priority when developing cloud native applications. The goal of this c...

University/Institute: Amazon Web Services

Details Take This Course

Blockchain Opportunities Beyond Crypto Assets

This specialization offers the latest developments in blockchain technology through a highly engagin...

University/Institute: Association of International Certified Professional Accountants

Details Take This Course

Understanding, Using, and Securing Crypto and Digital Assets

This specialization offers the latest developments in blockchain technology through a highly engagin...

University/Institute: Association of International Certified Professional Accountants

Details Take This Course

Hands-On Labs in Google Cloud for Security Engineers

Security is an uncompromising feature of Google Cloud services, and Google Cloud has developed speci...

University/Institute: Google Cloud

Details Take This Course

Blockchain Evolution and Technology Concepts

This specialization offers the latest developments in blockchain technology through a highly engagin...

University/Institute: Association of International Certified Professional Accountants

Details Take This Course

Introduction to Enterprise Resiliency

Resiliency is the ability to provide the required capability in the face of adversity, without signi...

University/Institute: IBM

Details Take This Course

Logging, Monitoring and Observability in Google Cloud

This three-day instructor-led course teaches participants techniques for monitoring, troubleshooting...

University/Institute: Google Cloud

Details Take This Course

Startup: How to build a successful business?

Startup is a newly opened company, that requires financial and resource aid for its further developm...

University/Institute: Saint Petersburg State University

Details Take This Course

Road to the CISO - Culminating Project Course

The ultimate destination for a security manager is the Chief Information Security Officer (or Chief...

University/Institute: University System of Georgia

Details Take This Course

The GRC Approach to Managing Cybersecurity

Managing cybersecurity is about managing risk, specifically the risk to information assets of valued...

University/Institute: University System of Georgia

Details Take This Course

The Foundations of Cybersecurity

In order to manage the cybersecurity function business, you must first understand its language and i...

University/Institute: University System of Georgia

Details Take This Course