Computer Science > > Computer Security and Networks

The GRC Approach to Managing Cybersecurity

Managing cybersecurity is about managing risk, specifically the risk to information assets of valued...

The Foundations of Cybersecurity

In order to manage the cybersecurity function business, you must first understand its language and i...

Technical Support Case Studies and Capstone

This course allows you to show what you’ve learned in the previous IT Technical Support professional...

Smart Contracts

This second course of the Blockchain specialization will help you design, code, deploy and execute a...

Security Principles

Welcome to course 1 of 5 of this Specialization, Security Principles. After completing this course,...

Security Operations and Administration

Security operations and administration is the task of identifying an organization's information asse...

Penetration Testing, Incident Response and Forensics

This course gives you the background needed to gain Cybersecurity skills as part of the Cybersecurit...

Palo Alto Networks Cybersecurity Foundation

Palo Alto Networks Cybersecurity Foundation Course Description: In this course, students will learn...

Operating Systems and You: Becoming a Power User

In this course -- through a combination of video lectures, demonstrations, and hands-on practice --...

OWASP Top 10 - Welcome and Risks 1-5

In this course, we will look at the OWASP organization and what its purpose is. We’ll dive into the...

Network Security

Welcome to course 4 of 5 of this Specialization, Network Security. In this course, we will look at c...

Managing Google Workspace

Managing Google Workspace is the second course in the Google Workspace Administration series. This c...

Managing Cybersecurity Incidents and Disasters

Most organizations plan for routine operations, but what happens when unexpected events overtake the...

Linux Fundamentals

This course is the first of a series that aims to prepare you for a role working as an information t...

Introduction to the Threat Intelligence Lifecycle

Today, we are faced with the increasing challenges of dealing with more aggressive and persistent th...

Introduction to TCP/IP

You use the Internet through your PC (Personal Computer), laptop, tablet, smartpad, and smartphone e...

Introduction to Google Workspace Administration

Introduction to Google Workspace Administration is the first course in the Google Workspace Administ...

Introduction to Cybersecurity Foundations

Most introductory or beginner level cybersecurity courses are not truly beginner level. Most of them...

Introduction to Cyber Attacks

This course provides learners with a baseline understanding of common cyber security threats, vulner...

Introduction to Computer Security

The purpose of this short four-week course is to introduce the topic of computer system security. We...