Search result for Master of science in security studies Online Courses & Certifications
Get Course Alerts by Email
How Entrepreneurs in Emerging Markets can master the Blockchain Technology
by Co-Pierre Georg- 4.5
Approx. 10 hours to complete
In this course, you will gain a thorough understanding of the blockchain and distributed ledger technologies, including an introduction to the necessary foundations in cryptography. is decentralized and uses the power of the blockchain to put users in full control over their own data. How Entrepreneurs in Emerging Markets can master the Blockchain Technology...
Sustainable Energy Capstone Assessment
by Professor Peta Ashworth- 0.0
2 Weeks
Participants who achieve a Sustainable Energy MicroMasters credential and who wish to continue their studies in the on-campus Master of Sustainable Energy at The University of Queensland, Brisbane, Australia, may be eligible to apply for credit. Plagiarism and cheating will result in expulsion from the program and repeal of certificate/s and credentials....
$50
Human-Computer Interaction IV: Evaluation, Agile Methods & Beyond
by David Joyner- 0.0
6 Weeks
This course takes you through the last nine lessons of CS6750: Human-Computer Interaction as taught in the Georgia Tech Online Master of Science in Computer Science program. Moreover, modern technologies have allowed high-fidelity prototypes to be developed with the relative ease of low-fidelity prototypes in the past, allowing even better feedback and evaluation to come in throughout the design process....
$99
Learning Windows Server Hyper-V 2016
by Packt Publishing- 4.5
3.5 hours on-demand video
You will start by walking through the basics of installing administrator, confident in your mastery of the basic functioning of Craig has more than thirty years' experience in the computer industry and holds a Bachelor of Science in Computer Science from California State University, Chico, and a Masters in Business Administration from Pepperdine University....
$12.99
Launching Machine Learning: Delivering Operational Success with Gold Standard ML Leadership
by Eric Siegel- 4.9
Approx. 14 hours to complete
- Evaluate ML: Report on the performance of predictive models in business terms, such as profit and ROI. This specialization includes illuminating software demos of machine learning in action using SAS products. Merging in other sources of data Merging in other sources of data Predictive policing in law enforcement and national security Predictive policing in law enforcement and national security...
Mastering Clean Code in JavaScript
by Packt Publishing- 4.3
4.5 hours on-demand video
Alongside HTML and CSS, JavaScript is one of the three core technologies of World Wide Web content production. After that, you will master By the end of the course, you will have learned to learn clean coding with functional programming, explored various modules in JavaScript, He is also finishing his Computer Science studies at the University of Athens....
$12.99
Risk Management for Cybersecurity and IT Managers
by Jason Dion • 600,000+ Enrollments Worldwide- 4.6
3 hours on-demand video
You will learn the terms used by executives and managers in discussing Risk Management, and how to apply the concepts of Risk Management to your networks, systems, and projects. This course also includes two case studies of what happens when risk management fails, as demonstrated by the Amazon Web Services outage and Equifax data breach that both occurred in 2017....
$19.99
Related searches
[2021] Data Science: A-Z Bootcamp + Real Cases (Version 8.1)
by William McGuffey Academy- 4.4
27 hours on-demand video
We offer the best data science courses in the industry that help you get into the depth of the subject and have a comprehensive knowledge of the tools like R, Excel, Power BI, Tableau and techniques. • Master the concept of applying ethical practices in everyday business activities and make business and data management decisions....
$12.99
Pentesting with Kali Linux
by Packt Publishing- 0.0
9.5 hours on-demand video
Managing security has always been a challenge for any security professional. Finally, you will learn how to hack each type of wireless security commonly used in today’s networks, including WEP, WPA, and WPA2. You’ll learn some basic wireless theory before learning how to hack each type of wireless security commonly used in today’s networks, including WEP, WPA, and WPA2....
$12.99
Motion Detector Interfacing with PIC Microcontroller
by Educational Engineering Team- 0.0
1.5 hours on-demand video
HD Content that will take you in an informative journey to not only master the coding of Motion Detector but also the details of how motion detector work and the method we use, how it works, it's a wiring diagram, and how your code can handle the motion once it's detected. Embed code in the design Understand the principles of programming motion detectors...
$12.99