Search result for Computer security and networks Online Courses & Certifications
Get Course Alerts by Email
Learn Graph algorithms with C++
by Kasun Liyanage- 0.0
2.5 hours on-demand video
Graph theory hold corner stone of modern computer science, extending its tentacles to social networks to neural networks to finding paths in maps. In this course we are looking at graph theory by computer science prospective. Topological sorting and strongly connected component associated algorithms...
$12.99
Basics of Network Security
by Christo Panchev , John Filippas , Antal Goldschmidt- 0.0
2
Explore the basic concepts of networks and network security and the tools used by network engineers and attackers. The basic principles of network security and cyber attacksReal-world security case studiesProtecting assetsIntrusion detection systemsAssessing security threats from a practical and theoretical viewpoint...
Free
Network Hacking Continued - Intermediate to Advanced
by Zaid Sabih- 4.7
10 hours on-demand video
First you will learn how to overcome some security features that would prevent you from even trying any attacks, you will learn how to discover and target hidden networks and bypass mac filtering whether it is implemented using a black-list or a white-list. 2 methods to hack WPA2 enterprise networks Bypass router-side security & run ARP spoofing attack without raising alarms....
$21.99
Cybersecurity and Mobility
by Dr. Humayun Zafar, CEH, CISM, CRISC, PCIP- 4.5
Approx. 14 hours to complete
Effective cybersecurity must be multi-dimensional and tiered, as threats can originate from virtually anywhere, target numerous levels of an organization, and sometimes persist for months or years before an information security staff is aware of an attack or breach. Effective Information Security Requires a Balance of Social and Technology Factors. Home Computer Security Reading Quiz...
Ethical Hacking & Penetration Testing: Kali Linux & Security
by Infinite Knowledge- 0.0
6.5 hours on-demand video
Ethical Hacking And Penetration Testing: Learn To Hack Network, Cyber & Web Security From Scratch, Nmap & Metasploit Information Security Threats and Attack VectorsHacking Concepts, Types and PhasesMalware ThreatsTrojan ConceptsMalware Reverse Engineering & DetectionAnti-Malware SoftwarePenetration TestingSession Hijacking ConceptsApplication Level Session HijackingNetwork-level Session HijackingHacking WebserversWebserver Attacks & ConceptsAttack MethodologyWebserver Attack ToolsHacking Web ApplicationsHacking Wireless Networks...
$12.99
Digital Networks Essentials
by Pierre Rolin , Laurent Toutain , Olivier Paul , Géraldine Texier- 0.0
6 Weeks
Every business today depends on connectivity, and now there is increasing demand for engineers who can design, develop and manage data networks – and keep them secure as well. This applied computer science MOOC will give you the hands-on know-how to master the network technologies used every day to communicate and access information via the web and phones....
$49
Teaching Impacts of Technology: Relationships
by Beth Simon- 0.0
Approx. 11 hours to complete
Technology and Computing Concepts: algorithms, software engineering evolution, heuristics, computer runtime, big O notation, P vs NP In terms of CSTA K-12 computer science standards, we’ll primarily cover learning objectives within the “impacts of computing” concept, while also including some within the “networks and the Internet” concepts and the “data and analysis” concept....
Related searches
Forensic Investigator Intermediate
by Integrity Training- 0.0
5 hours on-demand video
Computer Security and Computer Investigations are changing terms. The methods and techniques discussed in this class will train students to conduct computer investigations using revolutionary digital forensics technology. With this course, a professional can feel confident about his knowledge and ability to analyze any security flaws that may arise in the system....
$12.99
The Complete Social Engineering, Phishing, OSINT & Malware
by Muharrem AYDIN- 4.5
3.5 hours on-demand video
In addition to proficiency in basic computer skills and use of the command line, ethical hackers must also develop technical skills related to programming, database management systems (DBMS), use of the Linux operating system (OS), cryptography, creation and management of web applications and computer networks like DHCP, NAT, and Subnetting. cyber security...
$17.99
Learn Wi-Fi Password Penetration Testing (WEP/WPA/WPA2)
by Zaid Sabih- 4.6
6 hours on-demand video
46+ Videos to teach you how to hack and secure Wi-Fi (WEP, WPA, WPA2, WPA/WPA2 Enterprise) Welcome to my WiFi cracking course where you'll learn how to crack the key and get the password to WiFi networks weather they use WEP, WPA or even WPA2, not only that but you'll also learn how to secure networks from hackers....
$24.99