Filter by
SubjectRequired
LanguageRequired
The language used throughout the course, in both instruction and assessments.
Learning ProductRequired
LevelRequired
DurationRequired
SkillsRequired
SubtitlesRequired
EducatorRequired
Results for "computer security"
Illinois Tech
Skills you'll gain: Cybersecurity, Cyber Attacks, Network Security, Information Systems Security, Disaster Recovery, Business Continuity, Application Security, IT Security Architecture, Infrastructure Security, Cryptography, Regulation and Legal Compliance, Bash (Scripting Language), Encryption, Authorization (Computing), Risk Management, Virtualization
University of Maryland, College Park
Skills you'll gain: Security Engineering, Computer Hardware, Hardware Architecture, Threat Modeling, Threat Detection, Cybersecurity, Intrusion Detection and Prevention, Application Specific Integrated Circuits, Cryptography, Encryption, Technical Design, Emerging Technologies, System Design and Implementation
New York University
Skills you'll gain: Authentications, Public Key Infrastructure, Cryptography, Data Encryption Standard, Computer Security, Cybersecurity, Network Security, Security Controls, Encryption, Multi-Factor Authentication
University of California, Irvine
Skills you'll gain: Systems Development, Data Security, System Design and Implementation, Data Ethics, Cybersecurity, Safety and Security, Information Technology, Information Privacy, Computer Security Awareness Training, Technology Strategies, Data Management, Digital Communications
University of Colorado System
Skills you'll gain: Intrusion Detection and Prevention, Threat Detection, Open Web Application Security Project (OWASP), Incident Response, Penetration Testing, Distributed Denial-Of-Service (DDoS) Attacks, Cybersecurity, Threat Management, Data Security, Authentications, Cyber Attacks, Security Testing, Cloud Security, Security Strategy, Information Systems Security, Computer Security Awareness Training, Risk Management, Vulnerability Assessments, Enterprise Security, Cyber Security Assessment
University of Colorado System
Skills you'll gain: Data Encryption Standard, Public Key Infrastructure, Cryptography, Cybersecurity, Public Key Cryptography Standards (PKCS), Key Management, Advanced Encryption Standard (AES), Encryption, Cryptographic Protocols, Authentications, Arithmetic, Algorithms, Applied Mathematics, Data Integrity, Probability
Skills you'll gain: Cybersecurity, Business Continuity, Threat Detection, Endpoint Security, Disaster Recovery, Cyber Security Policies, Vulnerability Assessments, Network Security, Governance Risk Management and Compliance, Continuous Monitoring, Cloud Security, Risk Management
Skills you'll gain: Dashboard, SQL, Descriptive Statistics, Jupyter, Statistical Analysis, Data Analysis, Probability Distribution, Pandas (Python Package), Data Visualization Software, Statistics, Data Visualization, Databases, Stored Procedure, Web Scraping, Relational Databases, R Programming, Automation, Computer Programming Tools, GitHub, Python Programming
University of Colorado System
Skills you'll gain: Role-Based Access Control (RBAC), Authorization (Computing), Identity and Access Management, AWS Identity and Access Management (IAM), Geospatial Information and Technology, Encryption, Data Security, Network Security, Information Systems Security, Cryptography, Wireless Networks
Kennesaw State University
Skills you'll gain: Security Management, Incident Response, Risk Management, Computer Security Incident Management, Cyber Security Policies, Cyber Governance, Business Risk Management, Law, Regulation, and Compliance, Information Management, Cybersecurity, Business Ethics, Performance Measurement, Compliance Management, Governance, Cyber Risk, Organizational Strategy
Skills you'll gain: Generative AI, Software Development Life Cycle, Unit Testing, ChatGPT, HTML and CSS, Development Environment, Web Design and Development, Jupyter, Hypertext Markup Language (HTML), Software Engineering, Artificial Intelligence, Cascading Style Sheets (CSS), Web Development, Data Ethics, Application Deployment, Web Applications, Automation, Interviewing Skills, CI/CD, Professional Networking
Multiple educators
Skills you'll gain: Dashboard, Pseudocode, Jupyter, Algorithms, Data Mining, Pandas (Python Package), Data Visualization Software, Correlation Analysis, Web Scraping, NumPy, R Programming, Probability & Statistics, Predictive Modeling, Big Data, Automation, Computer Programming Tools, GitHub, Data Analysis Software, Machine Learning Algorithms, Unsupervised Learning
Searches related to computer security
In summary, here are 10 of our most popular computer security courses
- Cyber Security Technologies: Illinois Tech
- Hardware Security: University of Maryland, College Park
- Cyber Attack Countermeasures: New York University
- Data, Security, and Privacy: University of California, Irvine
- Cybersecurity for Business: University of Colorado System
- Introduction to Applied Cryptography: University of Colorado System
- Office of the CISO Institute: Cybersecurity Essentials: Google
- Data Science Fundamentals with Python and SQL: IBM
- Advanced System Security Topics: University of Colorado System
- The Business of Cybersecurity Capstone: Kennesaw State University