Information Technology > > Security

Environmental Health: the Foundation of Global Public Health

The first course of the Impacts of the Environment on Global Public Health specialization will provi...

DFSS for the 6 σ Black Belt

This course is designed for professionals interested in learning the principles of Lean Sigma, the D...

Palo Alto Networks Security Operations Fundamentals

In this Security Operations Fundamentals course you will gain an understanding of Security Pperation...

Palo Alto Networks Cloud Security Fundamentals

In this Cloud Security Fundamentals course you will learn basic principles associated with securing...

Palo Alto Networks Network Security Fundamentals

In this Network Security Fundamentals course you will gain an understanding of the fundamental tenan...

Trigonometría y geometría analítica

El curso Trigonometría y geometría analítica abordará en su primer módulo el estudio de la trigonome...

Digital Forensics Concepts

In the Digital Forensics Concepts course, you will learn about legal considerations applicable to co...

Windows Registry Forensics

The Windows Registry Forensics course shows you how to examine the live registry, the location of th...

Windows OS Forensics

The Windows OS Forensics course covers windows file systems, Fat32, ExFat, and NTFS. You will learn...

Serverless Data Processing with Dataflow: Operations

In the last installment of the Dataflow course series, we will introduce the components of the Dataf...

Palo Alto Networks Cybersecurity Foundation

Palo Alto Networks Cybersecurity Foundation Course Description: In this course, students will learn...

Introduction to Text Mining with R

This course gives you access to the text mining techniques that are used by top data scientists from...

Python Scripting: Files, Inheritance, and Databases

This course is the third course in a series that aims to prepare you for a role working as a program...

Comic Books, Geek Culture, and the Fandom Imaginary

"Comic Books, Geek Culture, and the Fandom Imaginary" explores some of the conventional framings of...

Computer Forensics

This three part InfoSec Specialization covers a wide variety of Computer Forensics topics. In the Di...

Introduction to Visual Basic Programming

This course is the second course in a series that aims to prepare you for a role working as a progra...

The Piano Sonata: Origins to Mozart

In this course, you'll be introduced to sonata form; how it works, where it came from, and how sonat...

Technical deep dive with Incident Response tools

The Cyber Incident Response course will give students an understanding of how incidents are responde...

Stages of Incident Response

The Cyber Incident Response course will give students an understanding of how incidents are responde...

Data Analysis with R

The R programming language is purpose-built for data analysis. R is the key that opens the door betw...