Search result for Digital security Online Courses & Certifications
Get Course Alerts by Email
Cyber Security Extreme Test Preparation
by AKASH RANJAN PATEL- 0.0
Website Security, Mobile Phone Security , Network Security , IOT Testing,Cyber Forensics Website Security :- Web application security is a branch of information security that deals specifically with security of websites, web applications and web services. Cyber Forensics :-Computer forensics is a branch of digital forensic science pertaining to evidence found in computers and digital storage media...
$12.99
Cybersecurity Compliance Framework & System Administration
by IBM Security Learning Services- 4.6
Approx. 16 hours to complete
Payment Card Industry Data Security Standard (PCI DSS) Center for Internet Security (CIS) Critical Security Controls Earn an IBM digital badge National Institute of Standards and Technology (NIST) Special Publication 800-53 Catalog of Security Controls Center for Internet Security (CIS) Critical Security Controls Define encryption, encoding, hashing and digital certificates as it relates to cryptography...
Cloud Security Basics
by Rick Smith- 4.7
Approx. 13 hours to complete
We'll learn and apply classic security techniques to today’s cloud security problems. We’ll analyze recent cloud security vulnerabilities using standard, systematic techniques. We’ll build our own web service case studies and construct security solutions for them. An overview of Cloud Security Basics Internet Service Security Security Controls: Packet Filtering Transport Layer Security...
Digital Transformation
by Michael Lenox , Amane Dannouni , Sonja Rueger , Ching Fong Ong- 4.8
Approx. 14 hours to complete
Digital transformation is a hot topic--but what exactly is it and what does it mean for companies? In this course, developed at the Darden School of Business at the University of Virginia, and led by top-ranked Darden faculty and Boston Consulting Group global management experts, we talk about digital transformation in two ways....
Cryptography
by Jonathan Katz- 4.6
Approx. 18 hours to complete
Proofs of Security Stronger Security Notions Security Against Chosen-Ciphertext Attacks Digital Signatures Digital Signatures Part II...
Digitalization in International Relations
by Yarygin Grigory , Sytnik Anna , Tsvetkova Natalia , Stadnik Ilona- 4.5
Approx. 16 hours to complete
Course participants will gain fundamental knowledge and practical skills regarding how to apply big data analysis, social media methods of analysis, how to build a digital information campaign strategy, how to operate by legal and technical components of global Internet governance in the practice of multilateral negotiations, and how to detect flaws and threats in the field of digital voting....
Design and Implementation of Digital Health Interventions
by Lisa Danquah , Céire Costelloe- 0.0
Approx. 31 hours to complete
This course covers various themes around design, regulatory approaches, ethics, technology adoption, implementation and strategy as applied to digital health. These session cover areas to include data regulations, examples of data breaches in digital health, the challenges and opportunities of technology adoption and implementation with a focus on the non-adoption, abandonment, scale-up, spread and sustainability framework (NASSS Framework)....
Hardware Security
by Gang Qu- 4.3
Approx. 12 hours to complete
In this course, we will study security and trust from the hardware perspective. Upon completing the course, students will understand the vulnerabilities in current digital system design flow and the physical attacks to these systems. Digital System Design: Basics and Vulnerabilities Digital System Specification Vulnerabilities in Digital Logic Design Role of Hardware in Security and Trust...
FinTech Security and Regulation (RegTech)
by Theodore Henry King CLARK- 4.6
Approx. 15 hours to complete
You will learn about how FinTech and RegTech disrupt and transform finance industry, such as challenges in protecting data and security with digital forensics, risk management and corporate governance in banking industry in terms of Know Your Customer (KYC) and Anti Money Laundering (AML), and how governments in different countries take initiatives in FinTech and RegTech....
Palo Alto Networks Academy Cybersecurity Foundation
by James Dalton- 4.7
Approx. 12 hours to complete
Course 1 of 5 in the Palo Alto Networks Security Operating Platform Cybersecurity Specialization. Cybersecurity Skills: Protecting Life in the Digital Age One Student at a Time Foundation Module 6 - Network Security Models Video: Network Security Models I Video: Network Security Models II Network Security Models Compliance and Security Foundation Module 7 - Cloud and Data Center Security...