

Our Courses

Basic Cryptography and Programming with Crypto API
In this MOOC, we will learn the basic concepts and principles of crytography, apply basic cryptoanalysis to decrypt messages encrypted with mono-alphabetic substitution cipher, and discuss the strongest encryption technique of the one-time-pad and related quantum key distribution systems.
-
Course by
-
Self Paced
-
17 hours
-
English

AWS S3 Basics
In this 1-hour long project-based course, you will learn about AWS S3 and its features like Encryption, Versioning, Static Website Hosting and Life cycle management. S3 stands for Simple Storage Service, it is a object-based storage service which AWS provides. S3 can also be used to host a static website. By the end of this project you will create S3 bucket and will be able upload content to the bucket. You will also enable Encryption, Versioning for S3 Bucket, Static website hosting and will create Lifecycle management rule for objects in S3 Bucket.
-
Course by
-
Self Paced
-
2 hours
-
English

Assets, Threats, and Vulnerabilities
This is the fifth course in the Google Cybersecurity Certificate. These courses will equip you with the skills you need to apply for an entry-level cybersecurity job. You’ll build on your understanding of the topics that were introduced in the fourth Google Cybersecurity Certificate course. In this course, you will explore the concepts of assets, threats, and vulnerabilities. First, you'll build an understanding of how assets are classified.
-
Course by
-
Self Paced
-
26 hours
-
English

Identifying Security Vulnerabilities
This course will help you build a foundation of some of the fundamental concepts in secure programming. We will learn about the concepts of threat modeling and cryptography and you'll be able to start to create threat models, and think critically about the threat models created by other people. We'll learn the basics of applying cryptography, such as encryption and secure hashing. We'll learn how attackers can exploit application vulnerabilities through the improper handling user-controlled data.
-
Course by
-
Self Paced
-
14 hours
-
English

Teaching Impacts of Technology: Data Collection, Use, and Privacy
In this course you’ll focus on how constant data collection and big data analysis have impacted us, exploring the interplay between using your data and protecting it, as well as thinking about what it could do for you in the future. This will be done through a series of paired teaching sections, exploring a specific “Impact of Computing” in your typical day and the “Technologies and Computing Concepts” that enable that impact, all at a K12-appropriate level.
-
Course by
-
Self Paced
-
13 hours
-
English

Security Operations
Welcome to course 5 of 5 of this Specialization, Security Operations. This course focuses our attention on the day-to-day, moment-by-moment active use of the security controls and risk mitigation strategies that an organization has in place. We will explore ways to secure the data and the systems they reside on, and how to encourage secure practices among people who interact with the data and systems during their daily duties.
-
Course by
-
Self Paced
-
8 hours
-
English

Encryption with Python: Encrypt data with key pairs
This guided project, Encryption with Python: Encrypt data with key pairs, will help a beginning security analyst who is looking to use the Python Cryptography package to encrypt data using a public key and a private key to decrypt data.
-
Course by
-
Self Paced
-
3 hours
-
English

Decryption with Python
By the end of this project, you will be able to apply different decryption algorithms and techniques using Python. Moreover, you will apply cryptography concepts through completing several practical exercises to build a solid foundation in decrypting information and data using several renowned industry encryption algorithms.
-
Course by
-
Self Paced
-
3 hours
-
English

Introduction to IT Security
Students will learn about the security management process. They will examine risk and risk management, including quantitative and qualitative risk assessments. The course includes discussion of security control types and physical security controls. Students will explore all aspects of Identity and Access Management (IAM) including single-factor and multi-factor authentication, account and access control, single sign-on and federation. Students will learn to harden endpoint devices including mobile and IoT devices.
-
Course by
-
Self Paced
-
23 hours
-
English

Data Encryption using AWS KMS From UST
Welcome to this Guided Project on Data Encryption using AWS KMS, From UST.
-
Course by
-
Self Paced
-
3 hours
-
English

Implement Platform Protection
Are you a security engineer who wants to learn how to lock down the infrastructure and network resources running in your Azure environment?
-
Course by
-
Self Paced
-
18 hours
-
English

Systems and Application Security
Course 7 - Systems and Application Security This is the seventh course under the specialization SSCP. This course discusses two major changes in recent years to how we use our data: going mobile and using the cloud. First, we use our data on the go by means of data services provided to our mobile phones, Wi-Fi, and other devices.
-
Course by
-
Self Paced
-
17 hours
-
English

Introduction to Cybersecurity Essentials
With this beginner friendly course, learn fundamental Cybersecurity skills that are crucial for anyone using computing devices and connecting to the Internet. You will first learn to recognize common security threats and risks that individuals and organizations may face, such as theft, tampering, and destruction of sensitive information. You’ll then discover the characteristics of cyber-attacks and learn how you can employ best practices to guard against them. Next, you’ll learn about the best practices against cyberattacks.
-
Course by
-
Self Paced
-
13 hours
-
English

Introduction to Encryption and Cryptography
Learn about how encryption helps to keep your information safe, and how it is used in the world today.
-
Course by
-
Self Paced
-
12
-
English

Cybersecurity Threat Vectors and Mitigation
This course provides a comprehensive overview of threat vectors and the strategies for mitigating them, and aims to equip you with the necessary skills and knowledge to safeguard against cyber threats. You’ll gain a deep understanding of the threat vectors used by attackers, discover encryption techniques, and explore different compliance concepts. This course will get you one step closer to the Microsoft Cybersecurity Analyst Professional Certificate, which requires no degree or prior experience.
-
Course by
-
Self Paced
-
20 hours
-
English

Security in Google Cloud
Through recorded lectures, demonstrations, and hands-on labs, participants explore and deploy the components of a secure Google Cloud solution, including Cloud Identity, the GCP Resource Manager, Cloud IAM, Google Virtual Private Cloud firewalls, Google Cloud Load balancing, Cloud CDN, Cloud Storage access control technologies, Security Command Center, Stackdriver, Security Keys, Customer-Supplied Encryption Keys, the Google Data Loss Prevention API, and Cloud Armor.
-
Course by
-
Self Paced
-
English

Encryption and Decryption using C++
By the end of this project, you will be able to create a basic application using Vigenere encryption-decryption technique to encrypt and decrypt messages. Throughout the project, you will be able to identify the basics of cryptography and how to encrypt and decrypt messages using a specific technique, you will be able to apply concepts like ASCII codes and type casting.
-
Course by
-
Self Paced
-
2 hours
-
English

An Introduction to Cryptography
Cryptography is an essential part of secure but accessible communication that's critical for our everyday life and organisations use it to protect their privacy and keep their conversations and data confidential. This course provides a comprehensive introduction to the fascinating world of cryptography, covering both historical cyphers and modern-day cryptographic techniques. In this course, you will explore the foundations of encryption, decryption, and cryptographic protocols.
-
Course by
-
Self Paced
-
8 hours
-
English

Introduction to Networks and Cisco Devices
In this 2-hours guided project, you will identify different components such as end devices, intermediary devices, and connection media and simulate network topologies in the Packet Tracer, manage Cisco network devices using telnet, SSH, and Console connections, and secure access to Cisco devices using passwords and password encryption services.
-
Course by
-
Self Paced
-
3 hours
-
English

AWS: Security in Data Analytics
AWS: Security in Data Analytics Course is the fourth course of AWS Certified Data Analytics Speciality Specialization. This course teaches learners the concepts of Security in Data Analytics with reference to AWS. Learners will be able to analyze appropriate authentication and authorization mechanisms, apply data protection and encryption techniques and data governance and compliance controls in this course. The course is divided into three modules and each module is further segmented by Lessons and Video Lectures.
-
Course by
-
Self Paced
-
6 hours
-
English

Securing a Cloud SQL for PostgreSQL Instance
This is a self-paced lab that takes place in the Google Cloud console. In this lab you will deploy a new Cloud SQL instance using a customer-managed encryption key (CMEK). You will configure pgAudit to selectively record and track SQL operations performed against that instance, then you will configure and test Cloud SQL IAM database authentication.
-
Course by
-
Self Paced
-
1 hour
-
English

The Internet: Encryption & Public Keys
What is the internet? This is the introductory series on how the Internet works. Join our movement and register at https://studio.code.org/users/sign_in and learn more at https://code.org/educate/resources/videos and at https://studio.code.org/courses
-
Course by
-
7 min
-
English

Implementing Blob Storage in Azure
This Guided Project “Implementing Blob Storage in Azure” is for anyone who wants to learn to create blob storage in Azure. In this 1-hour long project-based course, you will learn to create an Azure free account. You will also learn to create an Azure Storage account. You will also learn to work with containers and learn to upload blobs. Additionally, you will also learn to work with snapshots and shared access signatures for granting access to the storage account.
-
Course by
-
Self Paced
-
2 hours
-
English

AWS: Data Protection and Security Governance
AWS: Data Protection and Security Governance Course is the fourth course of Exam Prep SCS-C02: AWS Certified Security – Specialty Specialization. This course assists learners to design and implement mechanisms for data encryption at rest and in transit. The course is divided into three modules and each module is further segmented by Lessons and Video Lectures. This course facilitates learners with approximately 2:00-2:30 Hours of Video lectures that provide both Theory and Hands-On knowledge.
-
Course by
-
Self Paced
-
5 hours
-
English

Secure Your Data at Rest
Secure Your Data at Rest is the fifth course in the Microsoft Azure Security Engineer Associate Professional Certificate training program. This course teaches storage security, data sovereignty, database monitoring, encryption, data masking, and using Defender for Cloud for advanced threat protection.
-
Course by
-
Self Paced
-
17 hours
-
English