Filter by
SubjectRequired
LanguageRequired
The language used throughout the course, in both instruction and assessments.
Learning ProductRequired
LevelRequired
DurationRequired
SkillsRequired
SubtitlesRequired
EducatorRequired
Results for "computer security"
Hebrew University of Jerusalem
Skills you'll gain: Computer Architecture, Hardware Architecture, Computer Engineering, Computer Hardware, Computational Logic, Systems Architecture, Computer Programming, System Design and Implementation, Program Development, Data Storage
ISC2
Skills you'll gain: Network Security, Cybersecurity, Cyber Attacks, Infrastructure Security, Threat Detection, Computer Networking, Data Centers, General Networking, Network Planning And Design, Network Protocols, Network Model, Cloud Computing, TCP/IP
- Status: Free
Yonsei University
Skills you'll gain: TCP/IP, Network Protocols, Network Routing, Network Security, General Networking, Intrusion Detection and Prevention, File Transfer Protocol (FTP), Dynamic Host Configuration Protocol (DHCP), Network Architecture, Network Analysis
Infosec
Skills you'll gain: File Systems, Microsoft Windows, Cybersecurity, TCP/IP, Network Protocols, Data Security, Information Systems Security, File Management, Network Security, Operating Systems, Data Structures, Data Ethics, General Networking, Data Validation, Record Keeping, Data Storage Technologies, Data Analysis Software, User Accounts, USB, Systems Analysis
Skills you'll gain: Malware Protection, Identity and Access Management, Incident Response, Cybersecurity, Threat Modeling, Computer Security Incident Management, Network Security, Threat Management, Threat Detection, Cyber Attacks, Authentications, Distributed Denial-Of-Service (DDoS) Attacks, Security Awareness, Security Controls, Authorization (Computing), Multi-Factor Authentication, Human Factors (Security)
Skills you'll gain: Computer Hardware, Hardware Architecture, Data Storage Technologies, System Configuration, Computer Architecture, Operating Systems, Peripheral Devices
Skills you'll gain: Operating Systems, File Systems, Linux Commands, Linux, SQL, Unix Shell, Query Languages, Database Management, Command-Line Interface, Relational Databases, Authorization (Computing), Authentications, User Accounts
University of Colorado System
Skills you'll gain: Intrusion Detection and Prevention, Threat Detection, Open Web Application Security Project (OWASP), Incident Response, Penetration Testing, Risk Analysis, Distributed Denial-Of-Service (DDoS) Attacks, Cybersecurity, Threat Management, Data Security, Authentications, Cyber Attacks, Security Testing, Cloud Security, Security Strategy, Information Systems Security, Computer Security Awareness Training, Risk Management, Vulnerability Assessments, Enterprise Security
University of Michigan
Skills you'll gain: Programming Principles, Computer Programming, Python Programming, Computational Thinking, Software Installation, Development Environment
University of Illinois Urbana-Champaign
Skills you'll gain: C++ (Programming Language), Data Structures, Object Oriented Programming (OOP), Object Oriented Design, Graph Theory, Development Environment, Data Storage, Computer Programming, Software Engineering, Algorithms, Data Storage Technologies, Debugging, Program Development, Database Systems, Database Theory, Network Routing, Computational Thinking
MathWorks
Skills you'll gain: Computer Vision, Image Analysis, Anomaly Detection, Deep Learning, Applied Machine Learning, Artificial Neural Networks, Matlab, Application Deployment, PyTorch (Machine Learning Library), Machine Learning, Supervised Learning, Data Visualization, Automation, Artificial Intelligence and Machine Learning (AI/ML), Data Cleansing, Spatial Data Analysis, Machine Learning Methods, Visualization (Computer Graphics), Data Synthesis, Geospatial Information and Technology
- Status: Free
Coursera Instructor Network
Skills you'll gain: Computer Security Awareness Training, Cybersecurity, Security Awareness, Cyber Attacks, Data Security, Threat Modeling, Personally Identifiable Information, Malware Protection, Email Security
Searches related to computer security
In summary, here are 10 of our most popular computer security courses
- Build a Modern Computer from First Principles: From Nand to Tetris (Project-Centered Course): Hebrew University of Jerusalem
- Network Security: ISC2
- Introduction to TCP/IP: Yonsei University
- Computer Forensics: Infosec
- Introduction to Cybersecurity Tools & Cyberattacks: IBM
- Introduction to Contemporary Operating Systems and Hardware 1a: Illinois Tech
- Tools of the Trade: Linux and SQL: Google
- Cybersecurity for Business: University of Colorado System
- Programming for Everybody (Getting Started with Python): University of Michigan
- Accelerated Computer Science Fundamentals: University of Illinois Urbana-Champaign