دوراتنا

Secure Software Development: Verification and More Specialized Topics

Secure Software Development: Verification and More Specialized Topics

Learn how to verify software for security, and take a deeper dive into the basics of applying threat models and cryptography.

  • Course by
  • الإنجليزية
الاشتراك الشهري
متضمن في
  • الباقة الإبتدائية @ AED 99 + VAT
اعرف المزيد
Cybersecurity

Cybersecurity

The Cybersecurity Specialization covers the fundamental concepts underlying the construction of secure systems, from the hardware to the software to the human-computer interface, with the use of cryptography to secure in…

  • Course by
  • Self Paced
  • الإنجليزية
الاشتراك الشهري
متضمن في
  • الباقة الإبتدائية @ AED 99 + VAT
اعرف المزيد
Unlocking Information Security I: From Cryptography to Buffer Overflows

Unlocking Information Security I: From Cryptography to Buffer Overflows

Learn how systems are hacked and defended.

  • Course by
  • Self Paced
  • الإنجليزية
الاشتراك الشهري
متضمن في
  • الباقة الإبتدائية @ AED 99 + VAT
اعرف المزيد
Fundamentals of Computer Network Security

Fundamentals of Computer Network Security

This specialization in intended for IT professionals, computer programmers, managers, IT security professionals who like to move up ladder, who are seeking to develop network system security skills.

  • Course by
  • Self Paced
  • الإنجليزية
الاشتراك الشهري
متضمن في
  • الباقة الإبتدائية @ AED 99 + VAT
اعرف المزيد
Advanced System Security Design

Advanced System Security Design

This specialization is intended for intermediate level learners with basic programming skills and basic cybersecurity knowledge. Through this course learner will learn about advanced secure software techniques such as those for cloud computing, TOR, web-based cryptography, and geo-location/context based access control.

  • Course by
  • Self Paced
  • الإنجليزية
الاشتراك الشهري
متضمن في
  • الباقة الإبتدائية @ AED 99 + VAT
اعرف المزيد
IT Fundamentals for Cybersecurity

IT Fundamentals for Cybersecurity

There are a growing number of exciting, well-paying jobs in today’s security industry that do not require a traditional college degree. Forbes estimates that there will be as many as 3.5 million unfilled positions in the industry worldwide by 2021! One position with a severe shortage of skills is as a junior cybersecurity analyst. Throughout this specialization, you will learn concepts around cybersecurity tools and processes, system administration, operating system and database vulnerabilities, types of cyber attacks and basics of networking.

  • Course by
  • Self Paced
  • الإنجليزية
الاشتراك الشهري
متضمن في
  • الباقة الإبتدائية @ AED 99 + VAT
اعرف المزيد
Advanced Cybersecurity Concepts and Capstone Project

Advanced Cybersecurity Concepts and Capstone Project

In this course, you’ll learn about threat mitigation by following the three stages of threat modeling. The steps are: decomposing the application, determining and ranking threats, and determining countermeasures and mitigation. You’ll learn about access control, secure development, cryptography, as well as asset management. You’ll also be introduced to the types of attacks that IoT (Internet of Things) devices and services face. At the end of this course, you’ll also complete a focused security mitigation strategy plan for a given business.

  • Course by
  • Self Paced
  • 8 ساعات
  • الإنجليزية
الاشتراك الشهري
متضمن في
  • الباقة الإبتدائية @ AED 99 + VAT
اعرف المزيد
Encryption and Decryption using C++

Encryption And Decryption Using C++

By the end of this project, you will be able to create a basic application using Vigenere encryption-decryption technique to encrypt and decrypt messages. Throughout the project, you will be able to identify the basics of cryptography and how to encrypt and decrypt messages using a specific technique, you will be able to apply concepts like ASCII codes and type casting.

  • Course by
  • Self Paced
  • 2 ساعات
  • الإنجليزية
الاشتراك الشهري
متضمن في
  • الباقة الإبتدائية @ AED 99 + VAT
    Buy Now
  • Free
اعرف المزيد
Cyber Attack Countermeasures

Cyber Attack Countermeasures

This course introduces the basics of cyber defense starting with foundational models such as Bell-LaPadula and information flow frameworks. These underlying policy enforcements mechanisms help introduce basic functional protections, starting with authentication methods. Learners will be introduced to a series of different authentication solutions and protocols, including RSA SecureID and Kerberos, in the context of a canonical schema.   The basics of cryptography are also introduced with attention to conventional block ciphers as well as public key cryptography.

  • Course by
  • Self Paced
  • 19 ساعات
  • الإنجليزية
الاشتراك الشهري
متضمن في
  • الباقة الإبتدائية @ AED 99 + VAT
اعرف المزيد
Introduction to Applied Cryptography

Introduction to Applied Cryptography

This course is a non-mathematical introduction to the role that cryptography plays in providing digital security for everyday applications such as the internet, mobile phones, wireless networks and cryptocurrency. In this introductory course you will develop an understanding of the functionality and purpose of the main cryptographic tools we use today. You will learn how to make decisions about which cryptographic tools are most appropriate to deploy in specific settings.

  • Course by
  • Self Paced
  • الإنجليزية
الاشتراك الشهري
متضمن في
  • الباقة الإبتدائية @ AED 99 + VAT
اعرف المزيد
Applied Cryptography

Applied Cryptography

This specialization is intended for the learners interested in or already pursuing a career in computer security or other cybersecurity-related fields. Through four courses, the learners will cover the security of information systems, information entropy, classical cryptographic algorithms, symmetric cryptography, asymmetric/public-key cryptography, hash functions, message authentication codes, digital signatures, key management and distribution, and other fundamental cryptographic primitives and protocols.

  • Course by
  • Self Paced
  • الإنجليزية
الاشتراك الشهري
متضمن في
  • الباقة الإبتدائية @ AED 99 + VAT
اعرف المزيد
Cryptographic Hash and Integrity Protection

Cryptographic Hash and Integrity Protection

Welcome to Cryptographic Hash and Integrity Protection! This course reviews cryptographic hash functions in general and their use in the forms of hash chain and hash tree (Merkle tree). Building on hash functions, the course describes message authentication focusing on message authentication code (MAC) based on symmetric keys. We then discuss digital signatures based on asymmetric cryptography, providing security properties such as non-repudiation which were unavailable in symmetric-cryptography-based message authentication. This course is a part of the Applied Cryptography specialization.

  • Course by
  • Self Paced
  • 9 ساعات
  • الإنجليزية
الاشتراك الشهري
متضمن في
  • الباقة الإبتدائية @ AED 99 + VAT
اعرف المزيد
Blockchain Basics

Blockchain Basics

This first course of the Blockchain specialization provides a broad overview of the essential concepts of blockchain technology – by initially exploring the Bitcoin protocol followed by the Ethereum protocol – to lay the foundation necessary for developing applications and programming. You will be equipped with the knowledge needed to create nodes on your personal Ethereum blockchain, create accounts, unlock accounts, mine, transact, transfer Ethers, and check balances.

  • Course by
  • Self Paced
  • 16 ساعات
  • الإنجليزية
الاشتراك الشهري
متضمن في
  • الباقة الإبتدائية @ AED 99 + VAT
    Buy Now
  • AED 170.99 + VAT
اعرف المزيد
Cybersecurity Compliance Framework & System Administration

Cybersecurity Compliance Framework & System Administration

This course gives you the background needed to understand the key cybersecurity compliance and industry standards. This knowledge will be important for you to learn no matter what cybersecurity role you would like to acquire or have within an organization.\n\n You will learn the basic commands for user and server administration as it relates to security. You will need this skill to be able to understand vulnerabilities within your organizations operating systems.\n\nYou will learn the concepts of endpoint security and patch management.

  • Course by
  • Self Paced
  • 18 ساعات
  • الإنجليزية
الاشتراك الشهري
متضمن في
  • الباقة الإبتدائية @ AED 99 + VAT
    Buy Now
  • AED 170.99 + VAT
اعرف المزيد
Symmetric Cryptography

Symmetric Cryptography

Welcome to Symmetric Cryptography! Symmetric cryptography relies on shared secret key to ensure message confidentiality, so that the unauthorized attackers cannot retrieve the message. The course describes substitution and transposition techniques, which were the bases for classical cryptography when the message is encoded in natural language such as English. Then, we build on product ciphers (using both substitution and transposition/permutation) to describe modern block ciphers and review the widely used cipher algorithms in DES, 3-DES, and AES.

  • Course by
  • Self Paced
  • 13 ساعات
  • الإنجليزية
الاشتراك الشهري
متضمن في
  • الباقة الإبتدائية @ AED 99 + VAT
    Buy Now
  • AED 274.99 + VAT
اعرف المزيد
Number Theory and Cryptography

Number Theory and Cryptography

A prominent expert in the number theory Godfrey Hardy described it in the beginning of 20th century as one of the most obviously useless branches of Pure Mathematics”. Just 30 years after his death, an algorithm for encryption of secret messages was developed using achievements of number theory. It was called RSA after the names of its authors, and its implementation is probably the most frequently used computer program in the world nowadays. Without it, nobody would be able to make secure payments over the internet, or even log in securely to e-mail and other personal services.

  • Course by
  • Self Paced
  • 17 ساعات
  • الإنجليزية
الاشتراك الشهري
متضمن في
  • الباقة الإبتدائية @ AED 99 + VAT
    Buy Now
  • AED 274.99 + VAT
اعرف المزيد
Introduction to Blockchain for Financial Services

Introduction to Blockchain for Financial Services

In this first course of the specialization, we will discuss the limitations of the Internet for business and economic activity, and explain how blockchain technology represents the way forward. After completing this course, you will be able to explain what blockchain is, how it works, and why it is revolutionary. You will learn key concepts such as mining, hashing, proof-of-work, public key cryptography, and the double-spend problem. You’ll be able to describe seven design principles for blockchain technology, and the challenges facing the people developing it.

  • Course by
  • Self Paced
  • 29 ساعات
  • الإنجليزية
الاشتراك الشهري
متضمن في
  • الباقة الإبتدائية @ AED 99 + VAT
    Buy Now
  • AED 344.99 + VAT
اعرف المزيد
Introduction to Blockchain Technologies

Introduction to Blockchain Technologies

In this first course of the specialization, we will discuss the limitations of the Internet for business and economic activity, and explain how blockchain technology represents the way forward. After completing this course, you will be able to explain what blockchain is, how it works, and why it is revolutionary. You will learn key concepts such as mining, hashing, proof-of-work, public key cryptography, and the double-spend problem. You’ll be able to describe seven design principles for blockchain technology, and the challenges facing the people developing it.

  • Course by
  • Self Paced
  • 29 ساعات
  • الإنجليزية
الاشتراك الشهري
متضمن في
  • الباقة الإبتدائية @ AED 99 + VAT
    Buy Now
  • AED 344.99 + VAT
اعرف المزيد