Filter by
SubjectRequired
LanguageRequired
The language used throughout the course, in both instruction and assessments.
Learning ProductRequired
LevelRequired
DurationRequired
SkillsRequired
SubtitlesRequired
EducatorRequired
Results for "computer security"
Skills you'll gain: Peripheral Devices, Technical Support, Computer Hardware, Disaster Recovery, System Configuration, Hardware Troubleshooting, Microsoft Windows, Operating Systems, Linux, Networking Hardware, Computer Architecture, Mac OS, User Accounts
Google Cloud
Skills you'll gain: Google Cloud Platform, Cloud Infrastructure, Identity and Access Management, Data Loss Prevention, Distributed Denial-Of-Service (DDoS) Attacks, Prompt Engineering, Kubernetes, Cloud Security, Containerization, OAuth, Cloud Storage, Cloud Services, Application Deployment, Virtual Machines, Security Controls, Cloud Computing, Application Development, Data Storage Technologies, Threat Management, Virtual Private Networks (VPN)
Skills you'll gain: Computer Vision, Image Analysis, Deep Learning, Matlab, Applied Machine Learning, Machine Learning, Motion Graphics, Data Mapping, Artificial Intelligence and Machine Learning (AI/ML), Visualization (Computer Graphics), Geospatial Information and Technology, Feature Engineering, Medical Imaging, Machine Learning Algorithms, Data Validation, Geometric Dimensioning And Tolerancing, Performance Testing, Algorithms
Skills you'll gain: Cloud Computing, Linux, Linux Administration, Cloud Security, Operating Systems, Windows PowerShell, Windows Servers, File Systems, System Configuration, Mac OS, Command-Line Interface, Security Controls, Firewall, Virtualization and Virtual Machines, Containerization, User Accounts
Skills you'll gain: Incident Response, Security Controls, Cryptography, Malware Protection, Key Management, Vulnerability Assessments, Risk Management, Continuous Monitoring, Public Key Infrastructure, Endpoint Security, Disaster Recovery, Computer Security Incident Management, OSI Models, Network Security, Encryption, Authentications, Mobile Security, Operational Risk, Security Awareness, Authorization (Computing)
- Status: Free
The Hong Kong University of Science and Technology
Skills you'll gain: Audit Planning, Systems Development Life Cycle, Software Development Life Cycle, Auditing, Information Assurance, Internal Controls, Information Systems Security, Compliance Auditing, Risk Management, Security Controls, Change Management, System Implementation, Risk Analysis
- Status: Free
Universiteit Leiden
Skills you'll gain: Risk Management Framework, Safety and Security, Security Management, Threat Management, Public Safety and National Security, Cybersecurity, Incident Management, International Relations, Environmental Issue, Governance
Skills you'll gain: Cloud Computing Architecture, Cloud Services, Large Language Modeling, Cloud Security, Data Literacy, Cloud Infrastructure, Data Mining, Cloud Platforms, Cloud Computing, Artificial Intelligence, Generative AI, Data Ethics, Cloud Storage, Artificial Intelligence and Machine Learning (AI/ML), Infrastructure As A Service (IaaS), Big Data, Emerging Technologies, Applied Machine Learning, Data Analysis, Data Science
Rice University
Skills you'll gain: Computational Thinking, Event-Driven Programming, Algorithms, Combinatorics, Graph Theory, Programming Principles, Application Development, Object Oriented Programming (OOP), Data Structures, Probability, Computer Programming, Bioinformatics, Interactive Design, Program Development, Big Data, Python Programming, Mathematical Software, Data Analysis, Theoretical Computer Science, Computer Science
Hebrew University of Jerusalem
Skills you'll gain: Computer Architecture, Computer Hardware, Computational Logic, Computer Programming, System Design and Implementation, Technical Design, Software Design, Program Development, Debugging, Verification And Validation, Development Environment
ISC2
Skills you'll gain: Network Security, Cybersecurity, Cyber Attacks, Infrastructure Security, Threat Detection, Computer Networking, Data Centers, General Networking, Threat Management, Network Planning And Design, Firewall, Network Protocols, Cloud Computing, TCP/IP, Encryption
University of Illinois Urbana-Champaign
Skills you'll gain: C++ (Programming Language), Data Structures, Object Oriented Programming (OOP), Object Oriented Design, Graph Theory, Development Environment, Engineering Software, Computer Programming, Software Engineering, Algorithms, Debugging, Program Development, Database Systems, Database Theory, Network Routing, Theoretical Computer Science, Data Storage
Searches related to computer security
In summary, here are 10 of our most popular computer security courses
- Introduction to Hardware and Operating Systems: IBM
- Security in Google Cloud: Google Cloud
- Computer Vision for Engineering and Science: MathWorks
- Operating Systems: Overview, Administration, and Security: IBM
- ISC2 Systems Security Certified Practitioner (SSCP): ISC2
- Information Systems Auditing, Controls and Assurance: The Hong Kong University of Science and Technology
- Security & Safety Challenges in a Globalized World: Universiteit Leiden
- Key Technologies for Business: IBM
- Fundamentals of Computing: Rice University
- Build a Modern Computer from First Principles: From Nand to Tetris (Project-Centered Course): Hebrew University of Jerusalem