Filter by
SubjectRequired
LanguageRequired
The language used throughout the course, in both instruction and assessments.
Learning ProductRequired
LevelRequired
DurationRequired
SkillsRequired
SubtitlesRequired
EducatorRequired
Results for "computer security"
University of Colorado System
Skills you'll gain: Windows Servers, Computer Security, Linux Administration, Disaster Recovery, Authorization (Computing), Linux, Linux Servers, Microsoft Windows, Authentications, Business Continuity Planning, OSI Models, User Accounts, Group Policy, Security Management, System Monitoring, System Implementation, Systems Administration, Virtualization, Network Security, Linux Commands
- Status: [object Object]
Google
Skills you'll gain: Threat Modeling, Open Web Application Security Project (OWASP), Intrusion Detection and Prevention, Security Controls, Vulnerability Management, Incident Response, Computer Security Incident Management, Cyber Threat Intelligence, Vulnerability Assessments, Event Monitoring, Network Security, Security Awareness, Threat Detection, Risk Management, Cybersecurity, Hardening, Bash (Scripting Language), Data Ethics, Linux Commands, Debugging
University of Colorado System
Skills you'll gain: Open Web Application Security Project (OWASP), Penetration Testing, Security Testing, Security Strategy, Vulnerability Assessments, Cyber Security Assessment, Security Management, Vulnerability Scanning, Cyber Threat Intelligence, Threat Detection, Data Sharing
- Status: Free
University of Maryland, College Park
Skills you'll gain: Cyber Risk, Cyber Security Policies, Security Management, Cybersecurity, Risk Management, Cyber Security Strategy, Cyber Attacks, Cyber Governance, Computer Security Awareness Training, Threat Detection, General Networking, Vulnerability
University of London
Skills you'll gain: Linux, Linux Commands, Computer Systems, Command-Line Interface, Cybersecurity, Computer Architecture, Network Security, Vulnerability Assessments, Threat Detection, Authorization (Computing), Network Protocols, Virtual Private Networks (VPN), Operating Systems, Authentications, TCP/IP, Network Analysis
Skills you'll gain: Security Controls, Cybersecurity, Cyber Attacks, Security Awareness, Cyber Security Policies, Network Analysis, Security Information and Event Management (SIEM), Ethical Standards And Conduct, SQL
Skills you'll gain: Network Security, Encryption, Cybersecurity, Security Awareness, Cyber Attacks, Security Management, Security Strategy, Threat Detection, Firewall, Wireless Networks, Technical Support, Malware Protection, Authentications, Multi-Factor Authentication, Authorization (Computing), Generative AI
University of Maryland, College Park
Skills you'll gain: Usability, Human Computer Interaction, Authentications, Usability Testing, Interaction Design, Human Factors, Information Privacy, Personally Identifiable Information, User Interface (UI) Design, Multi-Factor Authentication, Human Centered Design, Data Sharing, Design
University of California, Davis
Skills you'll gain: Secure Coding, Application Security, Verification And Validation, Code Review, Linux, Vulnerability Assessments, Security Engineering, C++ (Programming Language), User Accounts, Data Validation, Debugging, Cryptography, File Systems, Authorization (Computing), C (Programming Language), Encryption, OS Process Management
- Status: [object Object]
Google
Skills you'll gain: Storyboarding, Wireframing, UI/UX Research, Responsive Web Design, User Experience Design, Design Thinking, User Research, Information Architecture, Figma (Design Software), Usability Testing, User Story, Web Design, Design Reviews, Usability, Presentations, Design Research, Persona (User Experience), Ideation, User Centered Design, Mockups
Google
Skills you'll gain: Scripting, Python Programming, Computer Programming, Algorithms, Problem Management, Data Structures, Debugging, Development Environment
DeepLearning.AI
Skills you'll gain: Computer Vision, Deep Learning, Image Analysis, Natural Language Processing, Artificial Neural Networks, Artificial Intelligence and Machine Learning (AI/ML), Tensorflow, Supervised Learning, Keras (Neural Network Library), Artificial Intelligence, Applied Machine Learning, PyTorch (Machine Learning Library), Machine Learning, Debugging, Performance Tuning, Machine Learning Methods, Python Programming, Data-Driven Decision-Making, Text Mining, Network Architecture
Searches related to computer security
In summary, here are 10 of our most popular computer security courses
- Computer Security and Systems Management: University of Colorado System
- Google Cybersecurity: Google
- Proactive Computer Security: University of Colorado System
- Cybersecurity for Everyone: University of Maryland, College Park
- Introduction to Computer Security: University of London
- Foundations of Cybersecurity: Google
- IT Security: Defense against the digital dark arts : Google
- Usable Security: University of Maryland, College Park
- Identifying Security Vulnerabilities in C/C++Programming: University of California, Davis
- Google UX Design: Google