This course gives you the background needed to understand basic Cybersecurity around people. process and technology. You will learn: â— Understand the key cybersecurity roles within an Organization. â— List key cybersecurity processes and an example of each process. â— Describe the architecture, file systems, and basic commands for multiple operating systems including … [Read more...] about Cybersecurity Roles, Processes & Operating System Security
Information Technology
Decentralized Finance (DeFi) Opportunities and Risks
DeFi and the Future of Finance is a set of four courses that focus on decentralized finance. The final course is called DeFi Opportunities and Risks. It is essential that you complete the first three courses: I. DeFi Infrastructure; II. DeFi Primitives; and III. DeFi Deep Dive before beginning the fourth course. The course starts with the premise that an analysis of any new … [Read more...] about Decentralized Finance (DeFi) Opportunities and Risks
Security and Privacy for Big Data – Part 1
This course sensitizes security in Big Data environments. You will discover cryptographic principles, mechanisms to manage access controls in your Big Data system. By the end of the course, you will be ready to plan your next Big Data project successfully, ensuring that all security-related issues are under control. You will look at decent-sized big data projects with … [Read more...] about Security and Privacy for Big Data – Part 1
Penetration Testing, Incident Response and Forensics
This course gives you the background needed to gain Cybersecurity skills as part of the Cybersecurity Security Analyst Professional Certificate program. You will learn about the different phases of penetration testing, how to gather data for your penetration test and popular penetration testing tools. Furthermore, you will learn the phases of an incident response, important … [Read more...] about Penetration Testing, Incident Response and Forensics
IT Security: Defense against the digital dark arts
This course covers a wide variety of IT security concepts, tools, and best practices. It introduces threats and attacks and the many ways they can show up. We’ll give you some background of encryption algorithms and how they’re used to safeguard data. Then, we’ll dive into the three As of information security: authentication, authorization, and accounting. We’ll also … [Read more...] about IT Security: Defense against the digital dark arts