Search result for Device and data security Online Courses & Certifications
Get Course Alerts by Email
Microsoft Intune Training (Includes Self Practice LABs)
by Pavan Kumar- 4.3
12 hours on-demand video
Microsoft Intune is a cloud-based service that focuses on mobile device management (MDM) and mobile application management (MAM). Ensure devices and apps are compliant with company security requirements. Set rules and configure settings on personal and organization-owned devices to access data and networks. Be sure devices and apps are compliant with your security requirements....
$15.99
Cyber Attack Countermeasures
by Dr. Edward G. Amoroso- 4.8
Approx. 19 hours to complete
This course introduces the basics of cyber defense starting with foundational models such as Bell-LaPadula and information flow frameworks. Information Flow Models and Hook-Up Theorem - Part 1 Information Flow Models and Hook-Up Theorem - Part 2 Required: “Password Security: A Case History,” Morris and Thompson Video: “The Security Mirage,” Bruce Schneier, TED Talk...
Introduction to Meteor.js Development
by Dr Matthew Yee-King- 4.6
Approx. 26 hours to complete
You will implement user authentication, security features, reactive templates and routing using iron router. You will carry out key database operations such as inserting, removing and updating data as well as sorting and filtering. Write MongoDB data filters to search for and sort data Security and routing Security and routing summary Security and routing summary quiz...
Cryptography I
by Dan Boneh- 4.8
Approx. 23 hours to complete
In this course you will learn the inner workings of cryptographic systems and how to correctly use them in real-world applications. Information Theoretic Security and The One Time Pad Stream Ciphers and Pseudo Random Generators Attacks on Stream Ciphers and The One Time Pad PRG Security Definitions Semantic Security Definitions and Security...
Big Data Modeling and Management Systems
by Ilkay Altintas , Amarnath Gupta- 4.4
Approx. 13 hours to complete
Once you’ve identified a big data issue to analyze, how do you collect, store and organize your data using Big Data solutions? In this course, you will experience various data genres and management tools appropriate for each. Data Scalability and Security Data Formats and Streaming Data Quiz DBMS-based and non-DBMS-based Approaches to Big Data...
IT Infrastructure and Emerging Trends
by Soumya Sen- 4.9
Approx. 8 hours to complete
Therefore it is important for managers and executives of all organizations to learn about various technologies and apply them in innovative ways. 3-3 Future of Data Security Learn about issues in cloud computing and various realizations of service-oriented computing. Become aware of cyber security threats that organizations need to be aware of and learn about various defense mechanisms....
Population Health: Responsible Data Analysis
by Mar Rodriguez Girondo , Jelle Goeman , Saskia le Cessie- 4.6
Approx. 21 hours to complete
You do not need to install R on your computer to follow the course, you will be able to access R and all the example data sets within the Coursera environment. Data privacy and security Privacy and security in practice Knows (the value of) all aspects of data management and acknowledge the importance of initial data analysis....
Related searches
The Development of Mobile Health Monitoring Systems
by Evgenii Pustozerov , Yuliya Zhivolupova , Aleksei Anisimov- 0.0
Approx. 21 hours to complete
Working on this task throughout the course, you will acquire a knowledge on how these branches of science, including electronics, mathematics, data science and programming are applied together in a real project. Data Exchange Between Device And Personal Computer Package Data Transferring Plotting Real-Time Data with Arduino Hardware Package Statistical Metrics and Sample Data Visualization...
The Social and Technical Context of Health Informatics
by Harold P. Lehmann, MD, Ph.D.- 4.2
Approx. 9 hours to complete
Improving health and healthcare institutions requires understanding of data and creation of interventions at the many levels at which health IT interact and affect the institution. Data scientists find that, when they aim at implementing their models in practice, it is the “socio” components that are both novel to them and mission critical to success....
Azure Infrastructure Fundamentals
by Michael Krout- 3.6
Approx. 30 hours to complete
Microsoft Azure is a service created by Microsoft to provide cloud computing for creating and managing applications and services using a cloud environment. We’ll begin with understanding the subscription, configuring security and acquiring storage. RBAC and Security Principals Azure Policy and Security Managing Device Settings and Adding Custom Domains Encryption, Endpoints, and Copying Data Data Security...