Filter by
SubjectRequired
LanguageRequired
The language used throughout the course, in both instruction and assessments.
Learning ProductRequired
LevelRequired
DurationRequired
SkillsRequired
SubtitlesRequired
EducatorRequired
Results for "challenges and fundamental concepts in security and privacy"
ISC2
Skills you'll gain: Network Security, Cybersecurity, Cyber Attacks, Infrastructure Security, Threat Detection, Computer Networking, Data Centers, General Networking, Network Planning And Design, Network Protocols, Network Model, Cloud Computing, TCP/IP
Royal Holloway, University of London
Skills you'll gain: Computer Security Incident Management, Cyber Governance, Incident Management, Incident Response, Security Management, Cyber Security Strategy, Cyber Security Policies, Human Factors (Security), Security Awareness, ISO/IEC 27001, Computer Security Awareness Training, Cyber Risk, Information Assurance
University of Pennsylvania
Skills you'll gain: Financial Statements, Return On Investment, Financial Statement Analysis, Finance, Financial Reporting, Capital Budgeting, Financial Accounting, Financial Modeling, Working Capital, Balance Sheet, Accrual Accounting, Accounting, Cash Flows, Income Statement, Generally Accepted Accounting Principles (GAAP), Financial Analysis, Tax Planning, Equities, Financial Planning, Corporate Finance
Skills you'll gain: Project Management, Milestones (Project Management), Data Storytelling, Requirements Analysis, Project Scoping, Stakeholder Management, Project Planning, Project Documentation, Quality Management, Interviewing Skills, Communication
Skills you'll gain: CI/CD, Open Web Application Security Project (OWASP), Istio, Continuous Integration, Software Development Life Cycle, Linux Commands, Agile Software Development, Unit Testing, Cloud Computing Architecture, Application Deployment, Test Driven Development (TDD), Gherkin (Scripting Language), Kubernetes, Jenkins, Bash (Scripting Language), Cloud Services, DevOps, Git (Version Control System), Jupyter, Grafana
- Status: Free
The State University of New York
Skills you'll gain: Cyber Threat Intelligence, Cyber Security Policies, Cybersecurity, International Relations, Cyber Risk, Cyber Operations, Cyber Governance, Infrastructure Security, Law, Regulation, and Compliance, Security Management, Political Sciences, Media and Communications, Computer Networking, Psychology
Skills you'll gain: Incident Response, Security Controls, Cryptography, Malware Protection, Key Management, Vulnerability Assessments, Risk Management, Continuous Monitoring, Public Key Infrastructure, Endpoint Security, Disaster Recovery, Computer Security Incident Management, OSI Models, Network Security, Encryption, Authentications, Mobile Security, Operational Risk, Security Awareness, Authorization (Computing)
The Hong Kong University of Science and Technology
Skills you'll gain: Computer Hardware, Computer Graphics, Computer Systems, Spreadsheet Software, Document Management, Graphic and Visual Design Software, File Management
University of Colorado Boulder
Skills you'll gain: Theoretical Computer Science, Algorithms, Data Structures, Graph Theory, Operations Research, Public Key Cryptography Standards (PKCS), Computational Logic, Cryptography, Computational Thinking, Pseudocode, Design Strategies, Combinatorics, Programming Principles, Computer Programming, Computer Science, Encryption, Network Model, Linear Algebra, Analysis, Mathematical Modeling
Edureka
Skills you'll gain: AWS Identity and Access Management (IAM), Cloud Security, Threat Detection, Network Security, Incident Response, Identity and Access Management, Computer Security Incident Management, Amazon Web Services, Threat Management, IT Security Architecture, Data Security, Security Strategy, Data Loss Prevention, Application Security, Cloud Standards, Cyber Attacks, Security Controls, Cloud Computing, Intrusion Detection and Prevention, Security Management
Multiple educators
Skills you'll gain: Network Security, Incident Response, Cloud Computing Architecture, Peripheral Devices, Penetration Testing, Computer Security Incident Management, Cloud Services, Security Controls, Business Continuity, Disaster Recovery, Information Assurance, System Configuration, Cybersecurity, Configuration Management, Computing Platforms, Cloud Security, Cloud Infrastructure, Network Troubleshooting, Security Awareness, Cloud Platforms
Columbia University
Skills you'll gain: Financial Market, Securities (Finance), Derivatives, Mathematical Modeling, Applied Mathematics, Capital Markets, Securities Trading, Futures Exchange, Equities, Finance, Financial Modeling, Probability, Risk Management, Portfolio Management, Cash Flows
In summary, here are 10 of our most popular challenges and fundamental concepts in security and privacy courses
- Network Security: ISC2
- Security Management and Governance: Royal Holloway, University of London
- Introduction to Finance and Accounting: University of Pennsylvania
- Capstone: Applying Project Management in the Real World: Google
- IBM DevOps and Software Engineering: IBM
- International Cyber Conflicts: The State University of New York
- ISC2 Systems Security Certified Practitioner (SSCP): ISC2
- Introduction to Computers and Office Productivity Software: The Hong Kong University of Science and Technology
- Foundations of Data Structures and Algorithms: University of Colorado Boulder
- Cloud Security on AWS: Edureka