دوراتنا

Industrial IoT Markets and Security

Industrial IoT Markets and Security

This course can also be taken for academic credit as ECEA 5385, part of CU Boulder’s Master of Science in Electrical Engineering degree. Developing tomorrow's industrial infrastructure is a significant challenge. This course goes beyond the hype of consumer IoT to emphasize a much greater space for potential embedded system applications and growth: The Industrial Internet of Things (IIoT), also known as Industry 4.0. Cisco’s CEO stated: “IoT overall is a $19 Trillion market.

  • Course by
  • Self Paced
  • 22 ساعات
  • الإنجليزية
الاشتراك الشهري
متضمن في
  • الباقة الإبتدائية @ AED 99 + VAT
    Buy Now
  • AED 344.99 + VAT
اعرف المزيد
Number Theory and Cryptography

Number Theory and Cryptography

A prominent expert in the number theory Godfrey Hardy described it in the beginning of 20th century as one of the most obviously useless branches of Pure Mathematics”. Just 30 years after his death, an algorithm for encryption of secret messages was developed using achievements of number theory. It was called RSA after the names of its authors, and its implementation is probably the most frequently used computer program in the world nowadays. Without it, nobody would be able to make secure payments over the internet, or even log in securely to e-mail and other personal services.

  • Course by
  • Self Paced
  • 17 ساعات
  • الإنجليزية
الاشتراك الشهري
متضمن في
  • الباقة الإبتدائية @ AED 99 + VAT
    Buy Now
  • AED 274.99 + VAT
اعرف المزيد
Java Programming: Arrays, Lists, and Structured Data

Java Programming: Arrays, Lists, and Structured Data

Build on the software engineering skills you learned in “Java Programming: Solving Problems with Software” by learning new data structures. Use these data structures to build more complex programs that use Java’s object-oriented features. At the end of the course you will write an encryption program and a program to break your encryption algorithm. After completing this course, you will be able to: 1. Read and write data from/to files; 2. Solve problems involving data files; 3. Perform quantitative analyses of data (e.g., finding maximums, minimums, averages); 4.

  • Course by
  • Self Paced
  • 14 ساعات
  • الإنجليزية
الاشتراك الشهري
متضمن في
  • الباقة الإبتدائية @ AED 99 + VAT
    Buy Now
  • AED 274.99 + VAT
اعرف المزيد
Cybersecurity Compliance Framework & System Administration

Cybersecurity Compliance Framework & System Administration

This course gives you the background needed to understand the key cybersecurity compliance and industry standards. This knowledge will be important for you to learn no matter what cybersecurity role you would like to acquire or have within an organization.\n\n You will learn the basic commands for user and server administration as it relates to security. You will need this skill to be able to understand vulnerabilities within your organizations operating systems.\n\nYou will learn the concepts of endpoint security and patch management.

  • Course by
  • Self Paced
  • 18 ساعات
  • الإنجليزية
الاشتراك الشهري
متضمن في
  • الباقة الإبتدائية @ AED 99 + VAT
    Buy Now
  • AED 170.99 + VAT
اعرف المزيد
Security Best Practices in Google Cloud

Security Best Practices in Google Cloud

This self-paced training course gives participants broad study of security controls and techniques on Google Cloud. Through recorded lectures, demonstrations, and hands-on labs, participants explore and deploy the components of a secure Google Cloud solution, including Cloud Storage access control technologies, Security Keys, Customer-Supplied Encryption Keys, API access controls, scoping, shielded VMs, encryption, and signed URLs. It also covers securing Kubernetes environments.

  • Course by
  • Self Paced
  • 12 ساعات
  • الإنجليزية
الاشتراك الشهري
متضمن في
  • الباقة الإبتدائية @ AED 99 + VAT
    Buy Now
  • AED 170.99 + VAT
اعرف المزيد
Essential Google Cloud Infrastructure: Core Services

Essential Google Cloud Infrastructure: Core Services

This accelerated on-demand course introduces participants to the comprehensive and flexible infrastructure and platform services provided by Google Cloud with a focus on Compute Engine. Through a combination of video lectures, demos, and hands-on labs, participants explore and deploy solution elements, including infrastructure components such as networks, systems and applications services. This course also covers deploying practical solutions including customer-supplied encryption keys, security and access management, quotas and billing, and resource monitoring.

  • Course by
  • Self Paced
  • 11 ساعات
  • الإنجليزية
الاشتراك الشهري
متضمن في
  • الباقة الإبتدائية @ AED 99 + VAT
    Buy Now
  • AED 171 + VAT
اعرف المزيد
IT Security: Defense against the digital dark arts

IT Security: Defense against the digital dark arts

This course covers a wide variety of IT security concepts, tools, and best practices. It introduces threats and attacks and the many ways they can show up. We’ll give you some background of encryption algorithms and how they’re used to safeguard data. Then, we’ll dive into the three As of information security: authentication, authorization, and accounting. We’ll also cover network security solutions, ranging from firewalls to Wifi encryption options.

  • Course by
  • Self Paced
  • 32 ساعات
  • الإنجليزية
الاشتراك الشهري
متضمن في
  • الباقة الإبتدائية @ AED 99 + VAT
    Buy Now
  • AED 170.99 + VAT
اعرف المزيد
Introduction to IT Security

Introduction to IT Security

Students will learn about the security management process. They will examine risk and risk management, including quantitative and qualitative risk assessments. The course includes discussion of security control types and physical security controls. Students will explore all aspects of Identity and Access Management (IAM) including single-factor and multi-factor authentication, account and access control, single sign-on and federation. Students will learn to harden endpoint devices including mobile and IoT devices.

  • Course by
  • Self Paced
  • 23 ساعات
  • الإنجليزية
الاشتراك الشهري
متضمن في
  • الباقة الإبتدائية @ AED 99 + VAT
اعرف المزيد
Introduction to Cybersecurity Essentials

Introduction to Cybersecurity Essentials

With this beginner friendly course, learn fundamental Cybersecurity skills that are crucial for anyone using computing devices and connecting to the Internet. You will first learn to recognize common security threats and risks that individuals and organizations may face, such as theft, tampering, and destruction of sensitive information. You’ll then discover the characteristics of cyber-attacks and learn how you can employ best practices to guard against them. Next, you’ll learn about the best practices against cyberattacks.

  • Course by
  • Self Paced
  • 13 ساعات
  • الإنجليزية
الاشتراك الشهري
متضمن في
  • الباقة الإبتدائية @ AED 99 + VAT
اعرف المزيد
Decryption with Python

Decryption with Python

By the end of this project, you will be able to apply different decryption algorithms and techniques using Python. Moreover, you will apply cryptography concepts through completing several practical exercises to build a solid foundation in decrypting information and data using several renowned industry encryption algorithms.

  • Course by
  • Self Paced
  • 3 ساعات
  • الإنجليزية
الاشتراك الشهري
متضمن في
  • الباقة الإبتدائية @ AED 99 + VAT
    Buy Now
  • Free
اعرف المزيد
Encryption with Python: Encrypt data with key pairs

Encryption with Python: Encrypt data with key pairs

This guided project, Encryption with Python: Encrypt data with key pairs, will help a beginning security analyst who is looking to use the Python Cryptography package to encrypt data using a public key and a private key to decrypt data. In this 1.5-hour long project-based course, you will learn how to create a private key using Python cryptography, use Python to save a key file, use Python cryptography to create a public key, encrypt a file using a Python generated public key, and decrypt a file using Python generated private key.

  • Course by
  • Self Paced
  • 3 ساعات
  • الإنجليزية
الاشتراك الشهري
متضمن في
  • الباقة الإبتدائية @ AED 99 + VAT
    Buy Now
  • Free
اعرف المزيد
Security Operations

Security Operations

Welcome to course 5 of 5 of this Specialization, Security Operations. This course focuses our attention on the day-to-day, moment-by-moment active use of the security controls and risk mitigation strategies that an organization has in place. We will explore ways to secure the data and the systems they reside on, and how to encourage secure practices among people who interact with the data and systems during their daily duties.

  • Course by
  • Self Paced
  • 8 ساعات
  • الإنجليزية
الاشتراك الشهري
متضمن في
  • الباقة الإبتدائية @ AED 99 + VAT
اعرف المزيد
Teaching Impacts of Technology: Data Collection, Use, and Privacy

Teaching Impacts of Technology: Data Collection, Use, and Privacy

In this course you’ll focus on how constant data collection and big data analysis have impacted us, exploring the interplay between using your data and protecting it, as well as thinking about what it could do for you in the future. This will be done through a series of paired teaching sections, exploring a specific “Impact of Computing” in your typical day and the “Technologies and Computing Concepts” that enable that impact, all at a K12-appropriate level.

  • Course by
  • Self Paced
  • 13 ساعات
  • الإنجليزية
الاشتراك الشهري
متضمن في
  • الباقة الإبتدائية @ AED 99 + VAT
اعرف المزيد
Identifying Security Vulnerabilities

Identifying Security Vulnerabilities

This course will help you build a foundation of some of the fundamental concepts in secure programming. We will learn about the concepts of threat modeling and cryptography and you'll be able to start to create threat models, and think critically about the threat models created by other people. We'll learn the basics of applying cryptography, such as encryption and secure hashing. We'll learn how attackers can exploit application vulnerabilities through the improper handling user-controlled data.

  • Course by
  • Self Paced
  • 14 ساعات
  • الإنجليزية
الاشتراك الشهري
متضمن في
  • الباقة الإبتدائية @ AED 99 + VAT
اعرف المزيد
Assets, Threats, and Vulnerabilities

Assets, Threats, and Vulnerabilities

This is the fifth course in the Google Cybersecurity Certificate. These courses will equip you with the skills you need to apply for an entry-level cybersecurity job. You’ll build on your understanding of the topics that were introduced in the fourth Google Cybersecurity Certificate course. In this course, you will explore the concepts of assets, threats, and vulnerabilities. First, you'll build an understanding of how assets are classified.

  • Course by
  • Self Paced
  • 26 ساعات
  • الإنجليزية
الاشتراك الشهري
متضمن في
  • الباقة الإبتدائية @ AED 99 + VAT
اعرف المزيد
AWS S3 Basics

AWS S3 Basics

In this 1-hour long project-based course, you will learn about AWS S3 and its features like Encryption, Versioning, Static Website Hosting and Life cycle management. S3 stands for Simple Storage Service, it is a object-based storage service which AWS provides. S3 can also be used to host a static website. By the end of this project you will create S3 bucket and will be able upload content to the bucket. You will also enable Encryption, Versioning for S3 Bucket, Static website hosting and will create Lifecycle management rule for objects in S3 Bucket.

  • Course by
  • Self Paced
  • 2 ساعات
  • الإنجليزية
الاشتراك الشهري
متضمن في
  • الباقة الإبتدائية @ AED 99 + VAT
    Buy Now
  • Free
اعرف المزيد
The Internet: Encryption & Public Keys

The Internet: Encryption & Public Keys

What is the internet? This is the introductory series on how the Internet works. Join our movement and register at https://studio.code.org/users/sign_in and learn more at https://code.org/educate/resources/videos and at https://studio.code.org/courses

  • Course by
  • 7 دقيقة
  • الإنجليزية
الاشتراك الشهري
متضمن في
    Buy Now
  • Free
اعرف المزيد
Data Encryption using AWS KMS From UST

Data Encryption using AWS KMS From UST

Welcome to this Guided Project on Data Encryption using AWS KMS, From UST.
For more than 20 years, UST has worked side by side with the world’s best companies to make a real impact through transformation. Powered by technology, inspired by people and led by their purpose, they partner with clients from design to operation.
With this Guided Project from UST, you can quickly build in-demand job skills and expand your career opportunities in the Securities field by learning how to use AWS KMS for Cryptographic Operations.

  • Course by
  • Self Paced
  • 3 ساعات
  • الإنجليزية
الاشتراك الشهري
متضمن في
  • الباقة الإبتدائية @ AED 99 + VAT
    Buy Now
  • Free
اعرف المزيد
Implement Platform Protection

Implement Platform Protection

Are you a security engineer who wants to learn how to lock down the infrastructure and network resources running in your Azure environment?

  • Course by
  • Self Paced
  • 18 ساعات
  • الإنجليزية
الاشتراك الشهري
متضمن في
  • الباقة الإبتدائية @ AED 99 + VAT
اعرف المزيد
Systems and Application Security

Systems and Application Security

Course 7 - Systems and Application Security This is the seventh course under the specialization SSCP. This course discusses two major changes in recent years to how we use our data: going mobile and using the cloud. First, we use our data on the go by means of data services provided to our mobile phones, Wi-Fi, and other devices.

  • Course by
  • Self Paced
  • 17 ساعات
  • الإنجليزية
الاشتراك الشهري
متضمن في
  • الباقة الإبتدائية @ AED 99 + VAT
اعرف المزيد
Introduction to Encryption and Cryptography

Introduction to Encryption and Cryptography

Learn about how encryption helps to keep your information safe, and how it is used in the world today.

  • Course by
  • Self Paced
  • 12
  • الإنجليزية
الاشتراك الشهري
متضمن في
  • الباقة الإبتدائية @ AED 99 + VAT
اعرف المزيد
Basic Cryptography and Programming with Crypto API

Basic Cryptography and Programming with Crypto API

In this MOOC, we will learn the basic concepts and principles of crytography, apply basic cryptoanalysis to decrypt messages encrypted with mono-alphabetic substitution cipher, and discuss the strongest encryption technique of the one-time-pad and related quantum key distribution systems.

  • Course by
  • Self Paced
  • 17 ساعات
  • الإنجليزية
الاشتراك الشهري
متضمن في
  • الباقة الإبتدائية @ AED 99 + VAT
اعرف المزيد
Cybersecurity Threat Vectors and Mitigation

Cybersecurity Threat Vectors and Mitigation

This course provides a comprehensive overview of threat vectors and the strategies for mitigating them, and aims to equip you with the necessary skills and knowledge to safeguard against cyber threats. You’ll gain a deep understanding of the threat vectors used by attackers, discover encryption techniques, and explore different compliance concepts. This course will get you one step closer to the Microsoft Cybersecurity Analyst Professional Certificate, which requires no degree or prior experience.

  • Course by
  • Self Paced
  • 20 ساعات
  • الإنجليزية
الاشتراك الشهري
متضمن في
  • الباقة الإبتدائية @ AED 99 + VAT
اعرف المزيد
Security in Google Cloud

Security in Google Cloud

Through recorded lectures, demonstrations, and hands-on labs, participants explore and deploy the components of a secure Google Cloud solution, including Cloud Identity, the GCP Resource Manager, Cloud IAM, Google Virtual Private Cloud firewalls, Google Cloud Load balancing, Cloud CDN, Cloud Storage access control technologies, Security Command Center, Stackdriver, Security Keys, Customer-Supplied Encryption Keys, the Google Data Loss Prevention API, and Cloud Armor.

  • Course by
  • Self Paced
  • الإنجليزية
الاشتراك الشهري
متضمن في
  • الباقة الإبتدائية @ AED 99 + VAT
اعرف المزيد
Encryption and Decryption using C++

Encryption And Decryption Using C++

By the end of this project, you will be able to create a basic application using Vigenere encryption-decryption technique to encrypt and decrypt messages. Throughout the project, you will be able to identify the basics of cryptography and how to encrypt and decrypt messages using a specific technique, you will be able to apply concepts like ASCII codes and type casting.

  • Course by
  • Self Paced
  • 2 ساعات
  • الإنجليزية
الاشتراك الشهري
متضمن في
  • الباقة الإبتدائية @ AED 99 + VAT
    Buy Now
  • Free
اعرف المزيد