Filter by
SubjectRequired
LanguageRequired
The language used throughout the course, in both instruction and assessments.
Learning ProductRequired
LevelRequired
DurationRequired
SkillsRequired
SubtitlesRequired
EducatorRequired
Results for "computer security"
Skills you'll gain: Bash (Scripting Language), Operating Systems, File Systems, Linux Commands, Linux, SQL, Unix, Database Management, Command-Line Interface, Relational Databases, Authorization (Computing), Authentications, User Accounts
Skills you'll gain: Cloud Computing, Linux, Linux Administration, Cloud Security, Operating Systems, Windows PowerShell, Windows Servers, File Systems, System Configuration, Mac OS, Command-Line Interface, Security Controls, Firewall, Virtualization and Virtual Machines, Containerization, User Accounts
Skills you'll gain: Computer Vision, Image Analysis, Deep Learning, Matlab, Applied Machine Learning, Machine Learning, Motion Graphics, Data Mapping, Artificial Intelligence and Machine Learning (AI/ML), Visualization (Computer Graphics), Geospatial Information and Technology, Feature Engineering, Medical Imaging, Machine Learning Algorithms, Data Validation, Geometric Dimensioning And Tolerancing, Performance Testing, Algorithms
University of London
Skills you'll gain: Computer Science, Debugging, Development Environment, Computer Systems, Web Applications, Arithmetic, Javascript, Computer Networking, Computational Thinking, Theoretical Computer Science, Human Computer Interaction, Hardware Architecture, Program Development, Computer Graphics, Operating Systems, Cybersecurity, Computer Programming, Problem Management, General Mathematics, Applied Mathematics
Hebrew University of Jerusalem
Skills you'll gain: Computer Architecture, Computer Hardware, Computational Logic, Computer Programming, System Design and Implementation, Technical Design, Software Design, Program Development, Debugging, Verification And Validation, Development Environment
Infosec
Skills you'll gain: File Systems, Microsoft Windows, Cybersecurity, TCP/IP, Network Protocols, Data Security, Information Systems Security, Litigation Support, Network Security, Operating Systems, Data Structures, General Networking, Data Validation, Record Keeping, Data Integrity, Data Storage, Data Analysis Software, User Accounts, USB, System Configuration
Skills you'll gain: Peripheral Devices, Technical Support, Computer Hardware, Disaster Recovery, System Configuration, Hardware Troubleshooting, Microsoft Windows, Operating Systems, Linux, Networking Hardware, Computer Architecture, Mac OS, User Accounts
Skills you'll gain: User Story, CI/CD, Istio, Open Web Application Security Project (OWASP), Continuous Integration, Software Development Life Cycle, Linux Commands, Kubernetes, Unit Testing, Cloud Computing Architecture, Application Deployment, Test Driven Development (TDD), Gherkin (Scripting Language), Jenkins, Bash (Scripting Language), Agile Software Development, DevOps, Git (Version Control System), Jupyter, Grafana
Skills you'll gain: Penetration Testing, Network Security, Mobile Security, Cloud Security, Public Key Infrastructure, Vulnerability Assessments, Cryptography, Security Controls, Threat Detection, Cybersecurity, Authorization (Computing), Security Awareness, Encryption, Malware Protection, Identity and Access Management, Wireless Networks, Data Security, Intrusion Detection and Prevention, Computer Security Awareness Training, Cyber Threat Intelligence
ISC2
Skills you'll gain: Network Security, Cybersecurity, Cyber Attacks, Infrastructure Security, Threat Detection, Computer Networking, Data Centers, General Networking, Threat Management, Network Planning And Design, Firewall, Network Protocols, Cloud Computing, TCP/IP, Encryption
- Status: Free
Coursera Instructor Network
Skills you'll gain: Computer Security Awareness Training, Cybersecurity, Security Awareness, Cyber Attacks, Data Security, Personally Identifiable Information, Malware Protection, Threat Management, Email Security
Skills you'll gain: Malware Protection, Identity and Access Management, Incident Response, Cybersecurity, Computer Security Incident Management, Network Security, Threat Management, Threat Detection, Cyber Attacks, Authentications, Distributed Denial-Of-Service (DDoS) Attacks, Security Awareness, Security Controls, Infrastructure Security, Authorization (Computing), Multi-Factor Authentication
Searches related to computer security
In summary, here are 10 of our most popular computer security courses
- Tools of the Trade: Linux and SQL: Google
- Operating Systems: Overview, Administration, and Security: IBM
- Computer Vision for Engineering and Science: MathWorks
- Introduction to Computer Science and Programming: University of London
- Build a Modern Computer from First Principles: From Nand to Tetris (Project-Centered Course): Hebrew University of Jerusalem
- Computer Forensics: Infosec
- Introduction to Hardware and Operating Systems: IBM
- IBM DevOps and Software Engineering: IBM
- Cybersecurity Attack and Defense Fundamentals: EC-Council
- Network Security: ISC2