Information Technology > > Security

Splunk Search Expert 102

Take the next step in your knowledge of Splunk. In this course, you will learn how to use time diffe...

Splunk Search Expert 101

This course helps you understand the basics of machine data. You will learn about Splunk components,...

Security Operations

Welcome to course 5 of 5 of this Specialization, Security Operations. This course focuses our attent...

Securing Software, Data and End Points

Course 4: Securing Software, Data and End Points Welcome to Course Four. As we know, most attacks ag...

Road to the CISO – Culminating Project Course

The ultimate destination for a security manager is the Chief Information Security Officer (or Chief...

Risk Management: Use of Access Controls to Protect Assets

Course 2: Understanding Risk Management Options and the Use of Access Controls to Protect Assets In...

Principles of Secure Coding

This course introduces you to the principles of secure programming. It begins by discussing the phil...

Operating System Foundations

In this course, we take a look at what an actual operating system is. People often confuse operating...

OWASP Top 10 - Risks 6-10

In this course, we will examine Vulnerable and Outdated Components, Identification and Authenticatio...

Networks and Communications Security

Welcome to Networks and Communications Security Course! In the Networks and Communications Security...

Network Security & Database Vulnerabilities

This course gives you the background needed to understand basic network security. You will learn the...

Network Defense Essentials (NDE)

Network Defense Essentials covers the fundamental concepts of information security and network defen...

Microsoft Azure Management Tools and Security Solutions

Microsoft Azure offers a wide range of services to deploy your applications. To keep control of your...

Maturing Risk Management

Course 8: Maturing Risk Management In management science terms, maturing a process or practice means...

Malware Analysis and Introduction to Assembly Language

Malicious software, or malware, is typically delivered over a network and is designed to cause disru...

Leadership

This course is an introduction and an overview to the basic principles of cybersecurity leadership a...

Introduction to Risk Management

In this course, you will learn about risk assessment techniques and how to implement a number of str...

Introduction to Python for Cybersecurity

This course it the first part of the Python for Cybersecurity Specialization. Learners will get an i...

Introduction to Enterprise Resiliency

Resiliency is the ability to provide the required capability in the face of adversity, without signi...

Introduction to Cybersecurity for Business

The world runs computers. From small to large businesses, from the CEO down to level 1 support staff...