دوراتنا

Healthcare IT Support

Healthcare IT Support

Are you looking to get your foot in the door as a Healthcare IT Support specialist? Do you want to solve technical problems for healthcare professionals and health system employees? Have you always wanted to enter an in-demand field in Health Information Technology? The courses in this specialization are designed to pique your interest regarding the ever-evolving field of IT support in healthcare. In order to help physicians, nurses, pharmacists, and a wide range of other allied health professionals and non-clinical staff, you need to be familiar with the basic language of healthcare.

  • Course by
  • Self Paced
  • الإنجليزية
الاشتراك الشهري
متضمن في
  • الباقة الإبتدائية @ AED 99 + VAT
اعرف المزيد
Advanced System Security Design

Advanced System Security Design

This specialization is intended for intermediate level learners with basic programming skills and basic cybersecurity knowledge. Through this course learner will learn about advanced secure software techniques such as those for cloud computing, TOR, web-based cryptography, and geo-location/context based access control.

  • Course by
  • Self Paced
  • الإنجليزية
الاشتراك الشهري
متضمن في
  • الباقة الإبتدائية @ AED 99 + VAT
اعرف المزيد
Data, Security, and Privacy

Data, Security, and Privacy

This course provides hands-on experience with technology-based productivity tools, as well as foundational knowledge and understanding of system design and development. The course is designed to integrate concepts of hardware, software, and the Internet. This course also provides an overview of data security, data privacy, and ways to increase productivity and efficiency. Students will also investigate technology career paths and some of the various certifications available in the industry.

  • Course by
  • Self Paced
  • 13 ساعات
  • الإنجليزية
الاشتراك الشهري
متضمن في
  • الباقة الإبتدائية @ AED 99 + VAT
اعرف المزيد
Healthcare Data Security, Privacy, and Compliance

Healthcare Data Security, Privacy, and Compliance

In the final course of the Healthcare IT Support program, we will focus on the types of healthcare data that you need to be aware, complexities of security and privacy within healthcare, and issues related to compliance and reporting. As a health IT support specialist, you’ll be exposed to different types of data sources and data elements that are utilized in healthcare. It’s important for you to understand the basic language of healthcare data and for you to recognize the sensitive nature of protected health information (PHI).

  • Course by
  • Self Paced
  • 6 ساعات
  • الإنجليزية
الاشتراك الشهري
متضمن في
  • الباقة الإبتدائية @ AED 99 + VAT
اعرف المزيد
Securing Software, Data and End Points

Securing Software, Data and End Points

Course 4: Securing Software, Data and End Points

  • Course by
  • Self Paced
  • 8 ساعات
  • الإنجليزية
الاشتراك الشهري
متضمن في
  • الباقة الإبتدائية @ AED 99 + VAT
اعرف المزيد
Security and Privacy for Big Data - Part 1

Security and Privacy for Big Data - Part 1

Welcome to our comprehensive course focused on security within Big Data environments. This course aims to provide you with a deep understanding of cryptographic principles and equip you with the tools necessary to manage access controls effectively within any Big Data system.

  • Course by
  • Self Paced
  • 1 ساعات
  • الإنجليزية
الاشتراك الشهري
متضمن في
  • الباقة الإبتدائية @ AED 99 + VAT
اعرف المزيد
Data Encryption using AWS KMS From UST

Data Encryption using AWS KMS From UST

Welcome to this Guided Project on Data Encryption using AWS KMS, From UST.
For more than 20 years, UST has worked side by side with the world’s best companies to make a real impact through transformation. Powered by technology, inspired by people and led by their purpose, they partner with clients from design to operation.
With this Guided Project from UST, you can quickly build in-demand job skills and expand your career opportunities in the Securities field by learning how to use AWS KMS for Cryptographic Operations.

  • Course by
  • Self Paced
  • 3 ساعات
  • الإنجليزية
الاشتراك الشهري
متضمن في
  • الباقة الإبتدائية @ AED 99 + VAT
    Buy Now
  • Free
اعرف المزيد
Understanding Google Cloud Security and Operations

Understanding Google Cloud Security and Operations

This course examines cost management, security, and operations in the cloud. First, it explores how businesses can choose to maintain some or none of their own infrastructure by purchasing IT services from a cloud provider. Next, it explains how the responsibility of data security is shared between the cloud provider and the business, and explores the defense-in-depth security built into Google Cloud.

  • Course by
  • Self Paced
  • 2 ساعات
  • الإنجليزية
الاشتراك الشهري
متضمن في
  • الباقة الإبتدائية @ AED 99 + VAT
اعرف المزيد
Security Operations

Security Operations

Welcome to course 5 of 5 of this Specialization, Security Operations. This course focuses our attention on the day-to-day, moment-by-moment active use of the security controls and risk mitigation strategies that an organization has in place. We will explore ways to secure the data and the systems they reside on, and how to encourage secure practices among people who interact with the data and systems during their daily duties.

  • Course by
  • Self Paced
  • 8 ساعات
  • الإنجليزية
الاشتراك الشهري
متضمن في
  • الباقة الإبتدائية @ AED 99 + VAT
اعرف المزيد
Productivity and Systems Development

Productivity and Systems Development

This course provides hands-on experience with technology-based productivity tools, as well as foundational knowledge and understanding of system design and development. The course is designed to integrate concepts of hardware, software, and the Internet. This course also provides an overview of data security, data privacy, and ways to increase productivity and efficiency. Students will also investigate technology career paths and some of the various certifications available in the industry.

  • Course by
  • Self Paced
  • 16 ساعات
  • الإنجليزية
الاشتراك الشهري
متضمن في
  • الباقة الإبتدائية @ AED 99 + VAT
اعرف المزيد
Network Defense Essentials (NDE)

Network Defense Essentials (NDE)

Network Defense Essentials covers the fundamental concepts of information security and network defense. This introductory cybersecurity course is designed for today's entry-level information security or cybersecurity careers and is ideal for learners aspiring to pursue a career in cybersecurity. The course gives a holistic overview of the key components of Information Security such as Identification, Authentication and Authorization, Virtualization and Cloud Computing, Wireless Networks, Mobile and IoT Devices, and Data Security.

  • Course by
  • Self Paced
  • 31 ساعات
  • الإنجليزية
الاشتراك الشهري
متضمن في
  • الباقة الإبتدائية @ AED 99 + VAT
اعرف المزيد
Cloud Data Security

Cloud Data Security

This course gives learners an opportunity to explore data security in the cloud. In this course, learners will: * Dive into the data services offered by cloud providers and compare their security features. * Analyze a data breach and trace it back to the vulnerability that made it possible. * Learn about database injection and aggregation attacks. * Follow the life cycle of a data item and its relationship to privacy and integrity. * Associate modern privacy requirements with US and European laws.

  • Course by
  • Self Paced
  • 11 ساعات
  • الإنجليزية
الاشتراك الشهري
متضمن في
  • الباقة الإبتدائية @ AED 99 + VAT
اعرف المزيد
Protecting Cloud Architecture with Alibaba Cloud

Protecting Cloud Architecture with Alibaba Cloud

Course Description The Security Exam Preparation Course is a series of online courses covering topics including Linux and Windows OS basics and operations, network fundamentals, host security, application security, network security, and data security.

  • Course by
  • Self Paced
  • 12 ساعات
  • الإنجليزية
الاشتراك الشهري
متضمن في
  • الباقة الإبتدائية @ AED 99 + VAT
اعرف المزيد
Advanced System Security Topics

Advanced System Security Topics

In this MOOC, we learn RBAC and ABAC access control to facilitate the specification and management of access policies. We learn examples of how RBAC is supported by modern systems such as Docker and AWS IAM. We learn XACML 3.0 and an ABAC implementation for controling secure access to web documents and network resources with attribute certificates, and XACML architecture components. We show how to exhance the data security with GeoEncryption, Secure Enhanced Geolocking, and R2D2 concepts which deliver data to right places via right path.

  • Course by
  • Self Paced
  • 15 ساعات
  • الإنجليزية
الاشتراك الشهري
متضمن في
  • الباقة الإبتدائية @ AED 99 + VAT
    Buy Now
  • AED 170.99 + VAT
اعرف المزيد