Information Technology > > Security
Managing Network Security
Almost every organization uses computer networks to share their information and to support their bus...
Malware Analysis and Introduction to Assembly Language
Malicious software, or malware, is typically delivered over a network and is designed to cause disru...
Introduction to Cybersecurity for Business
The world runs computers. From small to large businesses, from the CEO down to level 1 support staff...
Introduction to C++
This course is an introduction to the course. It presents the teacher, the tools and the content of...
Integração e Cibersegurança entre os Sistemas de Informação
Nossas boas-vindas ao Curso Integração e Cibersegurança entre os Sistemas de Informação. Neste curso...
Information Systems Auditing, Controls and Assurance
The course is awarded The Best Free Online Courses of All Time, and Best Online Courses of the Year...
Implementing a Risk Management Framework
The ultimate destination for a security manager is the Chief Information Security Officer (or Chief...
IBM Cybersecurity Analyst Assessment
A growing number of exciting, well-paying jobs in today’s security industry do not require a college...
How To Build a Network Topology Using GNS3
In this 1-hour 30-mins long project-based course, you will learn how to build a network topology usi...
Haz sonar la alarma: Detección y respuesta
En este sexto curso del Certificado de Ciberseguridad de Google te centrarás en la detección y respu...
Hardening Default GKE Cluster Configurations
This is a self-paced lab that takes place in the Google Cloud console. This lab demonstrates some of...
Grundlagen des technischen Supports
Dieser Kurs ist der erste in einer Reihe, die Sie auf den Berufseinstieg als IT-Supportspezialist vo...
Fraud Detection on Financial Transactions with Machine Learning on Google Cloud
This is a self-paced lab that takes place in the Google Cloud console. Explore financial transaction...
Digital Forensics Concepts
In the Digital Forensics Concepts course, you will learn about legal considerations applicable to co...
Data Privacy Fundamentals
This course is designed to introduce data privacy to a wide audience and help each participant see h...
Cybersecurity Management and Compliance
In this course, you’ll learn about data and record management, Information security, standards and p...
Cybersecurity Compliance Framework & System Administration
This course gives you the background needed to understand the key cybersecurity compliance and indus...
Créer des connexions sécurisées avec Tor pour l'anonymat
Ce projet guidé “Créer des connexions sécurisées avec Tor pour l'anonymat sur internet” est destiné...
Cloud Top Ten Risks
After completing the course, the student should be able to do the following: ● Associate lists of OW...
Chronicle SIEM: Outcomes & Functions
This is a self-paced lab that takes place in the Google Cloud console. In this lab, you will learn m...