A growing number of exciting, well-paying jobs in today’s security industry do not require a college degree. This is the final course required to assess your acquired knowledge and skills from from the previous two specializations, IT Fundamentals of Cybersecurity and Security Analyst Fundamentals, to become job-ready for a cybersecurity analyst role. You will be expected … [Read more...] about IBM Cybersecurity Analyst Assessment
Security
Blockchain: Foundations and Use Cases
This course is the definitive introduction to blockchain for both the developer and non-developer audience. Beyond the technology, this course will introduce you to some of the philosophy behind decentralization and why there is so much excitement around it. Join ConsenSys Academy and course instructor Nick Nelson in this rich-media introduction to the foundations of … [Read more...] about Blockchain: Foundations and Use Cases
OWASP Top 10 – Welcome and Risks 1-5
In this course, we will look at the OWASP organization and what its purpose is. We’ll dive into the details of how they create the Top Ten list: where it comes from, how they calculate the severity of each risk and how they determine where each risk ranks. We also review the possible disparity between OWASP’s ranking and your own organization’s ranking, depending on your … [Read more...] about OWASP Top 10 – Welcome and Risks 1-5
Windows Server Management and Security
Microsoft Windows has been at the forefront of enterprise computing for several decades. What most office workers see is the desktop side – such as Windows 7, 8 or 10. This course explores what it takes to design and build the server side of Windows in an enterprise environment. This course will explore everything from Windows Server installation to configuring users, to … [Read more...] about Windows Server Management and Security
Systems and Application Security
Welcome to Systems and Application Security Course! In the Systems and Application Security Course, you will gain an understanding of computer code that can be described as harmful or malicious. Both technical and non-technical attacks will be discussed. You will learn how an organization can protect itself from these attacks. You will learn concepts in endpoint device … [Read more...] about Systems and Application Security