Skip to main content

Learning Center

22 Results

  • Certificate in Cybersecurity

    , Cybersecurity

    40 Business Credits

    Cybersecurity, also known as Information Security, is the protection of data and personally identifiable information from malicious attacks, theft, and destruction.

  • Introduction to Cybersecurity Concepts and Practices

    , Cybersecurity

    5 Business Credits

    Globally, incidents of data breaches, identity thefts, and cybercrimes are on the rise, along with the explosive growth of online personal data and the expansion of computer networks.

  • Communication and Network Security

    , Cybersecurity

    5 Business Credits

    This course covers topics related to communications and network security. It begins with a lesson in the different types of networks and different transmission technologies.

    5

  • Compliance and Operational Security Scenarios

    , Cybersecurity

    5 Business Credits

    This course contains a discussion of the role of security governance and risk management in information security. It looks at the policies and standards that are needed to operate an effective information security function and to oversee good informa

    5

  • Identity and Access Management

    , Cybersecurity

    5 Business Credits

    This course introduces students to the principles of access controls, beginning with the central modes of information security and continuing through various attacks and defenses.

    5

  • Introduction to Malware

    , Cybersecurity

    5 Business Credits

    Malicious software, better known as malware, has become a central element in not just cybersecurity but daily life. It has played a role in everything from our politics to our economy, to our personal lives.

  • IT Access Control and Identity Management Scenarios

    , Cybersecurity

    5 Business Credits

    Access control is the restriction of access to a computer system. So how does a cybersecurity professional manage this access control? This course introduces the principles of access controls, beginning with the central modes of information security

  • IT Application Development for Cloud Computing

    , Cybersecurity

    5 Business Credits

    This course is intended to provide professionals who have some technical experience an overview of the application development process, how it applies to cloud computing, and the prevalent security concerns related to today's applications.

  • IT Application, Data, and Host Security Scenarios

    , Cybersecurity

    5 Business Credits

    When you download an app, or access a database, you want to trust that the software engineer who developed the app had an eye toward security.

  • IT Asset Security

    , Cybersecurity

    5 Business Credits

    Companies must protect their assets. Just as locks go on the doors to protect physical assets, electronic and data assets must also be guarded.

    5

  • IT Cloud Data Security

    , Cybersecurity

    5 Business Credits

    This course is comprised of two modules. The first addresses many of the important concepts of cloud-based data and the security responsibilities of both cloud consumers and cloud service providers.

    5

  • IT Cloud Infrastructure and Platform Security

    , Cybersecurity

    5 Business Credits

    This course is comprised of two modules. The first addresses many of the challenges for both cloud consumers and cloud service providers in securing the infrastructure and platforms used in cloud computing.

Back to Top