Information Technology > > Security

Managing Network Security

Almost every organization uses computer networks to share their information and to support their bus...

Malware Analysis and Introduction to Assembly Language

Malicious software, or malware, is typically delivered over a network and is designed to cause disru...

Introduction to Cybersecurity for Business

The world runs computers. From small to large businesses, from the CEO down to level 1 support staff...

Introduction to C++

This course is an introduction to the course. It presents the teacher, the tools and the content of...

Integração e Cibersegurança entre os Sistemas de Informação

Nossas boas-vindas ao Curso Integração e Cibersegurança entre os Sistemas de Informação. Neste curso...

Information Systems Auditing, Controls and Assurance

The course is awarded The Best Free Online Courses of All Time, and Best Online Courses of the Year...

Implementing a Risk Management Framework

The ultimate destination for a security manager is the Chief Information Security Officer (or Chief...

IBM Cybersecurity Analyst Assessment

A growing number of exciting, well-paying jobs in today’s security industry do not require a college...

How To Build a Network Topology Using GNS3

In this 1-hour 30-mins long project-based course, you will learn how to build a network topology usi...

Haz sonar la alarma: Detección y respuesta

En este sexto curso del Certificado de Ciberseguridad de Google te centrarás en la detección y respu...

Hardening Default GKE Cluster Configurations

This is a self-paced lab that takes place in the Google Cloud console. This lab demonstrates some of...

Grundlagen des technischen Supports

Dieser Kurs ist der erste in einer Reihe, die Sie auf den Berufseinstieg als IT-Supportspezialist vo...

Fraud Detection on Financial Transactions with Machine Learning on Google Cloud

This is a self-paced lab that takes place in the Google Cloud console. Explore financial transaction...

Digital Forensics Concepts

In the Digital Forensics Concepts course, you will learn about legal considerations applicable to co...

Data Privacy Fundamentals

This course is designed to introduce data privacy to a wide audience and help each participant see h...

Cybersecurity Management and Compliance

In this course, you’ll learn about data and record management, Information security, standards and p...

Cybersecurity Compliance Framework & System Administration

This course gives you the background needed to understand the key cybersecurity compliance and indus...

Créer des connexions sécurisées avec Tor pour l'anonymat

Ce projet guidé “Créer des connexions sécurisées avec Tor pour l'anonymat sur internet” est destiné...

Cloud Top Ten Risks

After completing the course, the student should be able to do the following: ● Associate lists of OW...

Chronicle SIEM: Outcomes & Functions

This is a self-paced lab that takes place in the Google Cloud console. In this lab, you will learn m...