Search result for Cyber security specialization areas Online Courses & Certifications
Get Course Alerts by Email
Introduction to Cyber Security
by Michael Goedeker- 0.0
8.5 hours on-demand video
Learn the basic and vital components of Cyber Security & Cyberspace. Details into Cyber Warfare, Espionage and Crime It is a comprehensive introduction into cyber security and the cyber areas that will help you understand more detailed aspects of the weaknesses, attacks and defenses used to attack or protect critical infrastructure....
$12.99
CyberSecurity - Basic Essential Skills - Practice Paper-2020
by Prithveesh K- 0.0
Cyber Security - Basic Essential Skills - 2020 Basics of Cyber Security in Topic wise Practice Papers for Enriching Knowledge, Clearing Interviews and Examinations. One who is curious about Cyber Security and Information Security. One who is attempting an interview or security examinations/certifications like CompTIA Sec+ or CEH. One who wants to enrich knowledge in the field of Cyber Security....
$12.99
Cyber Security Masterclass Course : Go From Zero to Hero
by Chinmay Kulkarni- 0.0
10.5 hours on-demand video
Once you move ahead in this course, you will get a clear idea about what cyber security is. Entire networking related to Cyber security and Terminologies - Threat, Vulnerability, Incident, Management, Attacks, Exploits, Events Careers and job opportunities in Cyber security Learn about different Cyber security organizations - NIST, NSA, SANS Institute, OWASP, CISCO...
$13.99
Cyber Security Economics
by Ross Anderson , Rainer Böhme , Michel van Eeten , Carlos H. Gañán- 0.0
10 Weeks
This requires a technical comprehension of security threats combined with an economic perspective to uncover the strategies employed by cyber hackers, attackers and defenders. Economics of information security investment. We discuss available economic tools to better align the incentives for cybersecurity, including better security metrics, cyber insurance/risk transfer, information sharing, and liability assignment....
$50
Palo Alto Networks Academy Cybersecurity Foundation
by James Dalton- 4.7
Approx. 12 hours to complete
Course 1 of 5 in the Palo Alto Networks Security Operating Platform Cybersecurity Specialization. Cyber Seek - Cyberecurity Career Pathways Cyber 101 - NIST Video: Cyber Threats Modern Cyber Attack Strategy Cyber Threats Self Check Foundation Module 6 - Network Security Models Video: Network Security Models I Video: Network Security Models II...
Cybersecurity and Its Ten Domains
by Dr. Humayun Zafar, CEH, CISM, CRISC, PCIP- 4.3
Approx. 24 hours to complete
Introduction to Security, Access Control, and Software Development Security Introduction to Security Software Development Security Introduction to Security, Access Control, and Software Development Security Quiz Information Security Governance and Risk Management & Legal, Regulations, Investigations, and Compliance Information Security Governance and Risk Management Information Security Governance and Risk Management & Legal, Regulations, Investigations, and Compliance Quiz...
Network Security
by Jonathan S. Weissman- 0.0
8 Weeks
In this course, you will examine the various areas of network security including intrusion detection, evidence collection and defense against cyber attacks....
$249
Related searches
Information Security: Context and Introduction
by Professor Peter Komisarczuk , Professor Keith M. Martin , Dr Jorge Blasco Alis- 4.7
Approx. 24 hours to complete
In this course you will explore information security through some introductory material and gain an appreciation of the scope and context around the subject. An introduction to knowledge areas in Information Security A brief introduction to cyber security knowledge areas The Cyber Security Industry and Careers Professional bodies in the context of Information Security...
Industrial IoT Markets and Security
by David Sluiter- 4.7
Approx. 22 hours to complete
The primary objective of this specialization is to closely examine emerging markets, technology trends, applications and skills required by engineering students, or working engineers, exploring career opportunities in the IIoT space. * What the top application areas are (examples include manufacturing and oil & gas) Security Segment 1 - Introduction, The Security Mindset...
Mobile Application Hacking and Penetration Testing (Android)
by Eslam Medhat (Ethical Hacking, Bug Bounty and Penetration Testing)- 0.0
1.5 hours on-demand video
This course includes all necessary information to start your carrier in Cyber Security field. The most common areas where we find mobile application data resides....
$18.99