

دوراتنا

Try It: Cybersecurity Basics
Do you want to add cybersecurity to your professional skill set? Join this free introductory course to learn cybersecurity basics — and without any prior experience. You’ll learn about the Confidentiality, Integrity, and Availability (CIA) Triad, and how it applies to the daily tasks of a cyber professional. You’ll also examine the basics of cryptography and apply them in an encryption-decryption challenge.
-
Course by
-
1
-
الإنجليزية

IT Security: Defense against the digital dark arts
This course covers a wide variety of IT security concepts, tools, and best practices. It introduces threats and attacks and the many ways they can show up. We’ll give you some background of encryption algorithms and how they’re used to safeguard data. Then, we’ll dive into the three As of information security: authentication, authorization, and accounting. We’ll also cover network security solutions, ranging from firewalls to Wifi encryption options.
-
Course by
-
Self Paced
-
32 ساعات
-
الإنجليزية

Essential Google Cloud Infrastructure: Core Services
This accelerated on-demand course introduces participants to the comprehensive and flexible infrastructure and platform services provided by Google Cloud with a focus on Compute Engine. Through a combination of video lectures, demos, and hands-on labs, participants explore and deploy solution elements, including infrastructure components such as networks, systems and applications services. This course also covers deploying practical solutions including customer-supplied encryption keys, security and access management, quotas and billing, and resource monitoring.
-
Course by
-
Self Paced
-
11 ساعات
-
الإنجليزية

Security Best Practices in Google Cloud
This self-paced training course gives participants broad study of security controls and techniques on Google Cloud. Through recorded lectures, demonstrations, and hands-on labs, participants explore and deploy the components of a secure Google Cloud solution, including Cloud Storage access control technologies, Security Keys, Customer-Supplied Encryption Keys, API access controls, scoping, shielded VMs, encryption, and signed URLs. It also covers securing Kubernetes environments.
-
Course by
-
Self Paced
-
12 ساعات
-
الإنجليزية

Cybersecurity Compliance Framework & System Administration
This course gives you the background needed to understand the key cybersecurity compliance and industry standards. This knowledge will be important for you to learn no matter what cybersecurity role you would like to acquire or have within an organization.\n\n You will learn the basic commands for user and server administration as it relates to security. You will need this skill to be able to understand vulnerabilities within your organizations operating systems.\n\nYou will learn the concepts of endpoint security and patch management.
-
Course by
-
Self Paced
-
18 ساعات
-
الإنجليزية

Java Programming: Arrays, Lists, and Structured Data
Build on the software engineering skills you learned in “Java Programming: Solving Problems with Software” by learning new data structures. Use these data structures to build more complex programs that use Java’s object-oriented features. At the end of the course you will write an encryption program and a program to break your encryption algorithm. After completing this course, you will be able to: 1. Read and write data from/to files; 2. Solve problems involving data files; 3. Perform quantitative analyses of data (e.g., finding maximums, minimums, averages); 4.
-
Course by
-
Self Paced
-
14 ساعات
-
الإنجليزية

Number Theory and Cryptography
A prominent expert in the number theory Godfrey Hardy described it in the beginning of 20th century as one of the most obviously useless branches of Pure Mathematics”. Just 30 years after his death, an algorithm for encryption of secret messages was developed using achievements of number theory. It was called RSA after the names of its authors, and its implementation is probably the most frequently used computer program in the world nowadays. Without it, nobody would be able to make secure payments over the internet, or even log in securely to e-mail and other personal services.
-
Course by
-
Self Paced
-
17 ساعات
-
الإنجليزية

Industrial IoT Markets and Security
This course can also be taken for academic credit as ECEA 5385, part of CU Boulder’s Master of Science in Electrical Engineering degree. Developing tomorrow's industrial infrastructure is a significant challenge. This course goes beyond the hype of consumer IoT to emphasize a much greater space for potential embedded system applications and growth: The Industrial Internet of Things (IIoT), also known as Industry 4.0. Cisco’s CEO stated: “IoT overall is a $19 Trillion market.
-
Course by
-
Self Paced
-
22 ساعات
-
الإنجليزية