The world runs computers. From small to large businesses, from the CEO down to level 1 support staff, everyone uses computers. This course is designed to give you a practical perspective on computer security. This course approaches computer security in a way that anyone can understand. Ever wonder how your bank website is secure when you connect to it? Wonder how other … [Read more...] about Introduction to Cybersecurity for Business
Security
Introduction to Python for Cybersecurity
This course it the first part of the Python for Cybersecurity Specialization. Learners will get an introduction and overview of the course format and learning objectives. … [Read more...] about Introduction to Python for Cybersecurity
AWS Fundamentals: Addressing Security Risk
Welcome to AWS Fundamentals: Addressing Security Risk! This course will give you an overview of security best practices when developing and managing applications on AWS. The course, created by AWS experts and delivered by AWS Solutions Architects, uses video lectures, hands-on exercise guides, demonstrations, and quizzes to dive deep on concepts about security on AWS. You will … [Read more...] about AWS Fundamentals: Addressing Security Risk
Identifying Security Vulnerabilities
This course will help you build a foundation of some of the fundamental concepts in secure programming. We will learn about the concepts of threat modeling and cryptography and you'll be able to start to create threat models, and think critically about the threat models created by other people. We'll learn the basics of applying cryptography, such as encryption and secure … [Read more...] about Identifying Security Vulnerabilities
The GRC Approach to Managing Cybersecurity
Managing cybersecurity is about managing risk, specifically the risk to information assets of valued by an organization. This course examines the role of Governance, Risk Management, and Compliance (GRC) as part of the Cybersecurity management process, including key functions of planning, policies, and the administration of technologies to support the protection of critical … [Read more...] about The GRC Approach to Managing Cybersecurity