Almost every organization uses computer networks to share their information and to support their bus...
University/Institute: University System of Georgia
Malicious software, or malware, is typically delivered over a network and is designed to cause disru...
University/Institute: IBM
The world runs computers. From small to large businesses, from the CEO down to level 1 support staff...
University/Institute: University of Colorado System
This course is an introduction to the course. It presents the teacher, the tools and the content of...
University/Institute: Infosec
Nossas boas-vindas ao Curso Integração e Cibersegurança entre os Sistemas de Informação. Neste curso...
University/Institute: Fundação Instituto de Administração
The course is awarded The Best Free Online Courses of All Time, and Best Online Courses of the Year...
University/Institute: The Hong Kong University of Science and Technology
The ultimate destination for a security manager is the Chief Information Security Officer (or Chief...
University/Institute: University System of Georgia
A growing number of exciting, well-paying jobs in today’s security industry do not require a college...
University/Institute: IBM
In this 1-hour 30-mins long project-based course, you will learn how to build a network topology usi...
University/Institute: Coursera Project Network
En este sexto curso del Certificado de Ciberseguridad de Google te centrarás en la detección y respu...
University/Institute: Google
This is a self-paced lab that takes place in the Google Cloud console. This lab demonstrates some of...
University/Institute: Google Cloud
Dieser Kurs ist der erste in einer Reihe, die Sie auf den Berufseinstieg als IT-Supportspezialist vo...
University/Institute: Google
This is a self-paced lab that takes place in the Google Cloud console. Explore financial transaction...
University/Institute: Google Cloud
In the Digital Forensics Concepts course, you will learn about legal considerations applicable to co...
University/Institute: Infosec
This course is designed to introduce data privacy to a wide audience and help each participant see h...
University/Institute: Northeastern University
In this course, you’ll learn about data and record management, Information security, standards and p...
University/Institute: Microsoft
This course gives you the background needed to understand the key cybersecurity compliance and indus...
University/Institute: IBM
Ce projet guidé “Créer des connexions sécurisées avec Tor pour l'anonymat sur internet” est destiné...
University/Institute: Coursera Project Network
After completing the course, the student should be able to do the following: ● Associate lists of OW...
University/Institute: University of Minnesota
This is a self-paced lab that takes place in the Google Cloud console. In this lab, you will learn m...
University/Institute: Google Cloud