

Our Courses

In the Trenches: Security Operations Center
Cyber-attacks, breaches, and incidents continue to grow. The sophistication and complexity of these attacks continue to evolve. More than ever organizations need to plan, prepare, and defend against a potential cyber incident. Security Operation Centers (SOCs) act as an organization's front-line defense against cyber incidents. SOC analyst accomplishes this by monitoring and responding to network and host anomalies, performing an in-depth analysis of suspicious events, and when necessary, aiding in forensic investigations.
-
Course by
-
Self Paced
-
11 hours
-
English

Cloud Data Security
This course gives learners an opportunity to explore data security in the cloud. In this course, learners will: * Dive into the data services offered by cloud providers and compare their security features. * Analyze a data breach and trace it back to the vulnerability that made it possible. * Learn about database injection and aggregation attacks. * Follow the life cycle of a data item and its relationship to privacy and integrity. * Associate modern privacy requirements with US and European laws.
-
Course by
-
Self Paced
-
11 hours
-
English

Mechanics of Materials I: Fundamentals of Stress & Strain and Axial Loading
This course explores the topic of solid objects subjected to stress and strain. The methods taught in the course are used to predict the response of engineering structures to various types of loading, and to analyze the vulnerability of these structures to various failure modes. Axial loading with be the focus in this course. ------------------------------ The copyright of all content and materials in this course are owned by either the Georgia Tech Research Corporation or Dr. Wayne Whiteman.
-
Course by
-
Self Paced
-
18 hours
-
English

Planning for Climate Change in African Cities
Climate change poses a threat to economic growth and long-term prosperity of many countries around the world. Africa is not an exception, considering the actual and potential impacts of climate change and climate variability that will threaten its vulnerable sectors and human populations. African countries are projected to experience changing rainfall patterns, rising sea levels, and higher temperatures that will affect food security, agricultural production, water availability, and public health, among others.
-
Course by
-
Self Paced
-
22 hours
-
English

Threat Investigation
If you are an associate-level cybersecurity analyst who is working in security operation centers, this course will help you understand how threat-centric SOC must prepare for analyzing new and emerging threats by implementing robust security investigation procedures • By the end of the course, you will be able to: • Understand cyber-threat hunting concepts • Describe the five hunting maturity levels (HM0–HM4) • Describe the hunting cycle four-stage loop• Describe the use of the Common Vulnerability Scoring System (CVSS) and list the CVSS v3.0 base metrics• Describe the CVSS v3.0 scoring compon
-
Course by
-
Self Paced
-
9 hours
-
English

Cybersecurity Tools and Technologies
This course engages you in the world of cybersecurity attack and defense, dealing with both sides and working with the tools associated with security testing within a cloud environment. You’ll gain knowledge on the penetration testing strategies employed by the industry to assess the integrity of their network. You’ll also interpret the results of security scans and deal with mitigation strategies such as vulnerability management.
-
Course by
-
Self Paced
-
20 hours
-
English

Assets, Threats, and Vulnerabilities
This is the fifth course in the Google Cybersecurity Certificate. These courses will equip you with the skills you need to apply for an entry-level cybersecurity job. You’ll build on your understanding of the topics that were introduced in the fourth Google Cybersecurity Certificate course. In this course, you will explore the concepts of assets, threats, and vulnerabilities. First, you'll build an understanding of how assets are classified.
-
Course by
-
Self Paced
-
26 hours
-
English

Web Application Security Testing with OWASP ZAP
By the end of this project, you will learn the fundamentals of how to use OWASP Zed Attack Proxy (ZAP). This tool greatly aids security professionals and penetration testers to discover vulnerabilities within web applications. You will learn how to perform a basic web app vulnerability scan, analyze the results, and generate a report of those results. This course includes steps on how to configure the browser proxy to passively scan web requests and responses by simply exploring websites.
-
Course by
-
Self Paced
-
2 hours
-
English

Vulnerability Scanning with Nmap: Network Scanning
The Vulnerability Scanning with Nmap: Network Scanning guided project dives into the use of the Nmap tool, a popular free and open-source tool used for network scanning and security auditing. This project covers how to verify the installation of Nmap and the Nmap version on a system, as well as the basics of network scanning, host discovery, port scanning, service enumeration, operating system detection, version detection, and vulnerability detection using the Nmap tool. We’ll cover practical steps for network scanning that can be used to showcase your skills to a current or future employer.
-
Course by
-
Self Paced
-
2 hours
-
English

From Climate Science to Action
Each part of the world faces specific vulnerabilities to climate change and has different opportunities to mitigate the effects and build resilience in the 21st century. With the ratification of the Paris Agreement, many countries have acceded to act in combatting climate change. Indeed, without climate action, decades of sustainable development is at risk, thus making this a ‘make or break’ point in time.
-
Course by
-
Self Paced
-
16 hours
-
English

Homeland Security & Cybersecurity Connection - It's Not About the Terrorists
Welcome to Course 1 in CS4950, Homeland Security and Cybersecruity. In this course we examine the origins of homeland security and its connection with cybersecurity. Homeland security is about safeguarding the United States from domestic catastrophic destruction. Catastrophic destruction comes in two forms: natural and man-made. For most of history the man-made variety came in the form of warfare and required the combined resources of a nation state. All that changed March 20th, 1995. On that date, members of a quasi-religious cult in Japan attacked the Tokyo subway system using Sarin gas.
-
Course by
-
Self Paced
-
12 hours
-
English

Introduction to IT Security
Students will learn about the security management process. They will examine risk and risk management, including quantitative and qualitative risk assessments. The course includes discussion of security control types and physical security controls. Students will explore all aspects of Identity and Access Management (IAM) including single-factor and multi-factor authentication, account and access control, single sign-on and federation. Students will learn to harden endpoint devices including mobile and IoT devices.
-
Course by
-
Self Paced
-
23 hours
-
English

Tourism and Climate Change
Global tourism’s CO2 emissions and overall environmental impact are substantial. Yet, is spite of the tourism sector’s vulnerability to the impacts of climate change, it continues to grow exponentially, driven by an ever rising tourism demand. Join Wageningen University & Research as our successful Tourism team explores the mutual impacts of tourism stakeholders and the climate. Take on our challenge of reimagining the tourism industry toward low-carbon, sustainable development! Subscribe now.
-
Course by
-
Self Paced
-
20
-
English

Storying the Self: (Re)Claiming our Voices
Engage with lived experiences and identities that have often been denied a public voice. Consider the nuanced contexts of race, gender, class, language, ability, and how these impact your position as a leader and creator. You’ll question what it means to reclaim your narrative of yourself and to engage with the strength of vulnerability as a leader and creator.
-
Course by
-
Self Paced
-
9 hours
-
English

Sustainable Tourism – promoting environmental public health
The MOOC introduces learners to key environmental health and natural resources management challenges associated with the rapid growth in international tourist arrivals into low-income countries. Since infrastructural and regulatory capacities in such countries are often limited they are more exposed to the negative implications of such development.
-
Course by
-
Self Paced
-
English

Introduction to Applied Cryptography
This course is a non-mathematical introduction to the role that cryptography plays in providing digital security for everyday applications such as the internet, mobile phones, wireless networks and cryptocurrency. In this introductory course you will develop an understanding of the functionality and purpose of the main cryptographic tools we use today. You will learn how to make decisions about which cryptographic tools are most appropriate to deploy in specific settings.
-
Course by
-
Self Paced
-
English

Palo Alto Networks Cloud Security Fundamentals
In this Cloud Security Fundamentals course you will learn basic principles associated with securing the cloud and SaaS-based applications through Secure Access Service Edge architecture and identify concepts required to recognize and potentially mitigate attacks against traditional and hybrid datacenters as well as mission critical infrastructure. The course also demonstrates how to initially setup and configure containers on a docker bridge network and test the container security through the use of vulnerability scans and reports.
-
Course by
-
Self Paced
-
9 hours
-
English

Advanced System Security Design
This specialization is intended for intermediate level learners with basic programming skills and basic cybersecurity knowledge. Through this course learner will learn about advanced secure software techniques such as those for cloud computing, TOR, web-based cryptography, and geo-location/context based access control.
-
Course by
-
Self Paced
-
English

Operational Research for Humanitarians
Evidence is central to good decision-making both in the humanitarian sector and beyond. Every day, a vast amount of evidence is generated that is relevant to humanitarian actors, much of it through research by academics and practitioners. This evidence can be incredibly valuable. It can help us better understand a situation and make humanitarian action more effective and accountable.
-
Course by
-
Self Paced
-
17 hours
-
English

The Addicted Brain
This is a course about addiction to drugs and other behaviors. It will describe what happens in the brain and how this information helps us deal with and overcome addiction. It will also discuss other topics, such as government policy and our vulnerability to take drugs.
-
Course by
-
Self Paced
-
22 hours
-
English

Secure Software Development: Requirements, Design, and Reuse
Learn the security basics that allow you to develop software that is hardened against attacks, and understand how you can reduce the damage and speed the response when a vulnerability is exploited.
-
Course by
-
Self Paced
-
English

Network Security & Database Vulnerabilities
This course gives you the background needed to understand basic network security. You will learn the about Local Area Networks, TCP/IP, the OSI Framework and routing basics. You will learn how networking affects security systems within an organization. You will learn the network components that guard an organization from cybersecurity attacks.\n\nIn addition to networking, you will learn about database vulnerabilities and the tools/knowledge needed to research a database vulnerability for a variety of databases including SQL Injection, Oracle, Mongo and Couch.
-
Course by
-
Self Paced
-
15 hours
-
English

Cyber Threat Intelligence
This course gives you the background needed to gain Cybersecurity skills as part of the Cybersecurity Security Analyst Professional Certificate program. \n\nYou will understand network defensive tactics, define network access control and use network monitoring tools. You will understand data protection risks and explore mobile endpoint protection.
-
Course by
-
Self Paced
-
25 hours
-
English