Computer Science > > Computer Security and Networks
The GRC Approach to Managing Cybersecurity
Managing cybersecurity is about managing risk, specifically the risk to information assets of valued...
The Foundations of Cybersecurity
In order to manage the cybersecurity function business, you must first understand its language and i...
Technical Support Case Studies and Capstone
This course allows you to show what you’ve learned in the previous IT Technical Support professional...
Smart Contracts
This second course of the Blockchain specialization will help you design, code, deploy and execute a...
Security Principles
Welcome to course 1 of 5 of this Specialization, Security Principles. After completing this course,...
Security Operations and Administration
Security operations and administration is the task of identifying an organization's information asse...
Penetration Testing, Incident Response and Forensics
This course gives you the background needed to gain Cybersecurity skills as part of the Cybersecurit...
Palo Alto Networks Cybersecurity Foundation
Palo Alto Networks Cybersecurity Foundation Course Description: In this course, students will learn...
Operating Systems and You: Becoming a Power User
In this course -- through a combination of video lectures, demonstrations, and hands-on practice --...
OWASP Top 10 - Welcome and Risks 1-5
In this course, we will look at the OWASP organization and what its purpose is. We’ll dive into the...
Network Security
Welcome to course 4 of 5 of this Specialization, Network Security. In this course, we will look at c...
Managing Google Workspace
Managing Google Workspace is the second course in the Google Workspace Administration series. This c...
Managing Cybersecurity Incidents and Disasters
Most organizations plan for routine operations, but what happens when unexpected events overtake the...
Linux Fundamentals
This course is the first of a series that aims to prepare you for a role working as an information t...
Introduction to the Threat Intelligence Lifecycle
Today, we are faced with the increasing challenges of dealing with more aggressive and persistent th...
Introduction to TCP/IP
You use the Internet through your PC (Personal Computer), laptop, tablet, smartpad, and smartphone e...
Introduction to Google Workspace Administration
Introduction to Google Workspace Administration is the first course in the Google Workspace Administ...
Introduction to Cybersecurity Foundations
Most introductory or beginner level cybersecurity courses are not truly beginner level. Most of them...
Introduction to Cyber Attacks
This course provides learners with a baseline understanding of common cyber security threats, vulner...
Introduction to Computer Security
The purpose of this short four-week course is to introduce the topic of computer system security. We...