Search result for Information security specialization Online Courses & Certifications
Get Course Alerts by Email
Cryptography and Information Theory
by Sang-Yoon Chang- 4.5
Approx. 8 hours to complete
Welcome to Cryptography and Information Theory! This course combines cryptography (the techniques for protecting information from unauthorized access) and information theory (the study of information coding and transfer). Security by Obscurity and Steganography, Part 1 Security by Obscurity and Steganography, Part 2 Kerckhoff's Principle and Security by Obscurity Information Entropy Information Entropy...
Designing data-intensive applications
by María del Pilar Ángeles- 0.0
Approx. 7 hours to complete
Welcome to the specialization course of Designing data-intensive applications. By the end of this specialization, learners will be able to propose, design, justify and develop high reliable information systems according to type of data and volume of information, response time, type of processing and queries in order to support scalability, maintainability, security and reliability considering the last information technologies....
Cyber Security in Manufacturing
by Shambhu Upadhyaya- 4.7
Approx. 22 hours to complete
Acquire knowledge about security needs and the application of information security systems. Information Security Framework - Part 1 Information Security Framework - Part 2 Application of Information Security - Part 1 Application of Information Security - Part 2 Additional (optional) Resources: Information Security Framework, Part 1 Additional (optional) Resources: Information Security Framework, Part 2...
CompTIA Cybersecurity Analyst CSA+ practice exams
by Jason Fox- 0.0
While CompTIA Security+ gives usual cybersecurity information and skills, both CSA+ and CASP, with a distinct focus, are recognized standard and advanced level certifications respectively and do approach the expanding need for specialization that cybersecurity now claims of professionals....
$12.99
Classical Cryptosystems and Core Concepts
by William Bahn , Richard White , Sang-Yoon Chang- 4.6
Approx. 12 hours to complete
The need to protect sensitive information and ensure the integrity of industrial control processes has placed a premium on cybersecurity skills in today’s information technology market. 5 million, according to Symantec, the world’s largest security software vendor. In this specialization, you will learn basic security issues in computer communications, classical cryptographic algorithms, symmetric-key cryptography, public-key cryptography, authentication, and digital signatures....
Palo Alto Networks Cybersecurity Essentials I
by James Dalton- 4.7
Approx. 18 hours to complete
Essentials I provides the student with a partial understanding of the fundamental tenants of cybersecurity and covers the general security concepts involved in maintaining a secure network computing environment. Essentials I: Module 1 - Course Information Essentials I Course Information - Textbook, Workforce Roles Reading: Security Models Essentials I: Module 3 - Security Operating Platform / Firewall Technology...
Palo Alto Networks Cybersecurity Essentials II
by James Dalton- 4.7
Approx. 14 hours to complete
Essentials II provides the student with a full understanding of the fundamental tenants of cybersecurity and covers the general security concepts involved in maintaining a secure network computing environment. Essentials II : Module 1 - Course Information Essentials II Course Information - Textbook, Workforce Roles Essentials II: Module 4 - Mobile / Cloud Security...
Related searches
Palo Alto Networks Academy Cybersecurity Foundation
by James Dalton- 4.7
Approx. 12 hours to complete
Course 1 of 5 in the Palo Alto Networks Security Operating Platform Cybersecurity Specialization. Foundation - Module 1: Course Information Foundation Course Information - Textbook , Work Roles Foundation Module 6 - Network Security Models Video: Network Security Models I Video: Network Security Models II Network Security Models Compliance and Security...
Industrial IoT Markets and Security
by David Sluiter- 4.7
Approx. 22 hours to complete
The primary objective of this specialization is to closely examine emerging markets, technology trends, applications and skills required by engineering students, or working engineers, exploring career opportunities in the IIoT space. * What platforms are, and also market information on Software and Services Security Segment 1 - Introduction, The Security Mindset...
Detecting and Mitigating Cyber Threats and Attacks
by Greg Williams- 4.7
Approx. 12 hours to complete
Their information is stolen or posted online. This is the third course in the Practical Computer Security specialization. Splunk and Security...