Information Technology > > Security
Splunk Search Expert 102
Take the next step in your knowledge of Splunk. In this course, you will learn how to use time diffe...
Splunk Search Expert 101
This course helps you understand the basics of machine data. You will learn about Splunk components,...
Security Operations
Welcome to course 5 of 5 of this Specialization, Security Operations. This course focuses our attent...
Securing Software, Data and End Points
Course 4: Securing Software, Data and End Points Welcome to Course Four. As we know, most attacks ag...
Road to the CISO – Culminating Project Course
The ultimate destination for a security manager is the Chief Information Security Officer (or Chief...
Risk Management: Use of Access Controls to Protect Assets
Course 2: Understanding Risk Management Options and the Use of Access Controls to Protect Assets In...
Principles of Secure Coding
This course introduces you to the principles of secure programming. It begins by discussing the phil...
Operating System Foundations
In this course, we take a look at what an actual operating system is. People often confuse operating...
OWASP Top 10 - Risks 6-10
In this course, we will examine Vulnerable and Outdated Components, Identification and Authenticatio...
Networks and Communications Security
Welcome to Networks and Communications Security Course! In the Networks and Communications Security...
Network Security & Database Vulnerabilities
This course gives you the background needed to understand basic network security. You will learn the...
Network Defense Essentials (NDE)
Network Defense Essentials covers the fundamental concepts of information security and network defen...
Microsoft Azure Management Tools and Security Solutions
Microsoft Azure offers a wide range of services to deploy your applications. To keep control of your...
Maturing Risk Management
Course 8: Maturing Risk Management In management science terms, maturing a process or practice means...
Malware Analysis and Introduction to Assembly Language
Malicious software, or malware, is typically delivered over a network and is designed to cause disru...
Leadership
This course is an introduction and an overview to the basic principles of cybersecurity leadership a...
Introduction to Risk Management
In this course, you will learn about risk assessment techniques and how to implement a number of str...
Introduction to Python for Cybersecurity
This course it the first part of the Python for Cybersecurity Specialization. Learners will get an i...
Introduction to Enterprise Resiliency
Resiliency is the ability to provide the required capability in the face of adversity, without signi...
Introduction to Cybersecurity for Business
The world runs computers. From small to large businesses, from the CEO down to level 1 support staff...