Search result for Security studies Online Courses & Certifications
Get Course Alerts by Email
Cryptography and Information Theory
by Sang-Yoon Chang- 4.5
Approx. 8 hours to complete
More specifically, the course studies cryptography from the information-theoretical perspectives and discuss the concepts such as entropy and the attacker knowledge capabilities, e. Security by Obscurity and Steganography, Part 1 Security by Obscurity and Steganography, Part 2 Kerckhoff's Principle and Security by Obscurity Computational Security and Side-Channel Attack Lecture Slides for Computational Security and Side Channel Attacks...
Basics of Network Security
by Christo Panchev , John Filippas , Antal Goldschmidt- 0.0
2
Explore the basic concepts of networks and network security and the tools used by network engineers and attackers. The basic principles of network security and cyber attacksReal-world security case studiesProtecting assetsIntrusion detection systemsAssessing security threats from a practical and theoretical viewpoint...
Free
Cloud Computing Security
by Patrick Appiah-Kubi , Charif El MaMouni- 0.0
8 Weeks
Learn how to identify security issues in the cloud and industry-standard techniques and procedures to prevent and mitigate risks. Case studies and government standard documents will be reviewed to help ensure appropriate levels of security are implemented. Evaluate security issues with cloud infrastructure Review case studies and standard documents on cloud security...
$299
Securing Digital Democracy
by J. Alex Halderman- 4.8
Approx. 14 hours to complete
In this course, you'll learn what every citizen should know about the security risks--and future potential — of electronic voting and Internet voting. Voting as a Security Problem The Security Mindset Voting as a Security Problem Security Procedures and Voting Around the World Case Studies Security Procedures and Voting Around the World...
Cloud Security Basics
by Rick Smith- 4.7
Approx. 13 hours to complete
We'll learn and apply classic security techniques to today’s cloud security problems. We’ll analyze recent cloud security vulnerabilities using standard, systematic techniques. We’ll build our own web service case studies and construct security solutions for them. An overview of Cloud Security Basics Internet Service Security Security Controls: Packet Filtering Transport Layer Security...
New Approaches to Countering Terror: Countering Violent Extremism
by Bill Braniff- 4.7
Approx. 4 hours to complete
START, a Department of Homeland Security Emeritus Center of Excellence and research, training, and education center housed at the University of Maryland within the College of Behavioral and Social Sciences (BSOS), serves as a leading voice in the national and international dialogue regarding CVE. Master of Professional Studies (MPS) degree in Security and Terrorism Studies: https://www....
Cybersecurity Risk Management
by Tong Sun- 0.0
8 Weeks
Learn key principles of risk analysis, risk assessment and risk mitigation for information security using both qualitative and quantitative methodologies. You will learn the details of how to apply these frameworks in assessing information security risk. Information security risk management framework and methodologies Identifying and modeling information security risks Articulating information security risks as business consequences...
$249
Related searches
Operational Risks Management ORM
by Usman Zuberi- 0.0
1.5 hours on-demand video
Operational Risks Management ORM Case Studies for Risk Management, Compliance, Audit, IS Security, Banking Professionals Module 2: 6 DIFFERENT CASE STUDIES IS Security professionals...
$12.99
Usable Security
by Jennifer Golbeck- 4.6
Approx. 12 hours to complete
We will look at basic principles of human-computer interaction, and apply these insights to the design of secure systems with the goal of developing security measures that respect human performance and their goals within a system. Usability Studies Intro to Usable Security Guidelines Interface Guidelines for Usable Security Week 4 - Guidelines for Usable Security...
Security & Safety Challenges in a Globalized World
by Bibi van den Berg , Ruth Prins- 4.8
Approx. 12 hours to complete
Security and safety challenges rank among the most pressing issues of modern times. This course combines scholarly inquiry from multiple disciplines (ranging from terrorism studies, to crisis management, to medical science) with real-life cases to explore and understand complex modern-day safety and security challenges. Safety and Security Van den Berg and Hutten: Security and Safety: An Introduction...