Information Technology > > Security

Analyze City Data Using R and Tableau

By the end of this project, you will create, clean, explore and analyze San Francisco's building per...

Managing Cybersecurity

This specialization is intended for those learners that: - would preferably have an undergraduate (b...

The GRC Approach to Managing Cybersecurity

Managing cybersecurity is about managing risk, specifically the risk to information assets of valued...

The Foundations of Cybersecurity

In order to manage the cybersecurity function business, you must first understand its language and i...

Managing Network Security

Almost every organization uses computer networks to share their information and to support their bus...

Managing Cybersecurity Incidents and Disasters

Most organizations plan for routine operations, but what happens when unexpected events overtake the...

Startups in open innovation

This course was created in the partnership with StPetersburg Electrotechnical University ETU "LETI"....

Penetration Testing, Incident Response and Forensics

This course gives you the background needed to gain Cybersecurity skills as part of the Cybersecurit...

IBM Cybersecurity Analyst Assessment

A growing number of exciting, well-paying jobs in today's security industry do not require a college...

Cybersecurity Capstone: Breach Response Case Studies

This course gives you the background needed to gain Cybersecurity skills as part of the Cybersecurit...

Cyber Threat Intelligence

This course gives you the background needed to gain Cybersecurity skills as part of the Cybersecurit...

Security Analyst Fundamentals

There are a growing number of exciting, well-paying jobs in today's security industry that do not re...

IBM Cybersecurity Analyst

A growing number of exciting, well-paying jobs in today's security industry do not require a college...

Data Privacy Fundamentals

This course is designed to introduce data privacy to a wide audience and help each participant see h...

Fundamentos de IA para Todos

La Inteligencia Artificial (IA) ya no es ciencia ficción. Está impregnando rápidamente todos los sec...

Check Point Jump Start: Network Security

In this course brought to you by industry leader Check Point, they will cover cybersecurity threats...

Security in Google Cloud Platform

Through recorded lectures, demonstrations, and hands-on labs, participants explore and deploy the co...

Security Awareness Training

The security of an organization is of the utmost importance and every member of the organization's s...

Data Engineering with Google Cloud

This program provides the skills you need to advance your career in data engineering and recommends...

Computer Simulations

Big data and artificial intelligence get most of the press about computational social science, but m...