Security Online Courses for Concord Students

Found 18 listings, displaying 1-18
Filter:
Welcome to Cryptography! Cryptography is the practice and study of techniques for securing communications in the presence of third parties. You will learn how to protect information in order to ensure its integrity, confidentiality, authenticity, and non-repudiation. You will come out with a...
Whether you are accessing a bank website, Netflix or your home router, chances are that your computer is interacting with a Linux system. The world runs on Linux. In this course, we will dive into how Linux works from an enterprise perspective. In week 1 we will look at what Linux is used for in...
In this MOOC, you will learn the history of DDoS attacks and analyze new Mirai IoT Malware and perform source code analysis. you will be provided with a brief overview of DDoS Defense techniques. You learn an Autonomous Anti-DDoS Network called A2D2 for small/medium size organizations to deal...
With every smartphone and computer now boasting multiple processors, the use of functional ideas to facilitate parallel programming is becoming increasingly widespread. In this course, you\'ll learn the fundamentals of parallel programming, from task parallelism to data parallelism. In...
Computer attacks and data breaches are inevitable. It seems like every day a data breach occurs and the victims of the data breach suffer. Their information is stolen or posted online. The company\'s or businesses who had the breach go on, learn a little from the attack, and just give credit...
The world runs on computers. Your watch, your TV, your car. You might be familiar on how to operate each of these. Your home computer you are even more familiar with operating it. But what does it take to really take computer systems to the next level? - The enterprise level. In this course we...
Welcome to Networks and Communications Security Course! In the Networks and Communications Security Course, you will learn about the network structure, data transmission methods, transport formats, and the security measures used to maintain integrity, availability, authentication, and...
Palo Alto Networks Cybersecurity Essentials II Course Description: Essentials II provides the student with a full understanding of the fundamental tenants of cybersecurity and covers the general security concepts involved in maintaining a secure network computing environment. Students will fully...
Cybersecurity Gateway II Gateway II Course Description Gateway II provides the student with a full understanding of the fundamental tenants of networking and covers the general concepts involved in maintaining a secure network computing environment. Upon successful completion of this course,...
This course teaches learners (industry professionals and students) the fundamental concepts of parallel programming in the context of Java 8. Parallel programming enables developers to use multicore computers to make their applications run faster by using multiple processors at the same time. By...
According to Steven Blank a business startup, or any new venture startup is essentially a proto-type. Thus the startup process essentially becomes a learning process to refine that business proto-type into a scalable, replicable finished \'product\'. At the end of this course learners will be...
Welcome to Systems and Application Security Course! In the Systems and Application Security Course, you will gain an understanding of computer code that can be described as harmful or malicious. Both technical and non-technical attacks will be discussed. You will learn how an organization can...
Through recorded lectures, demonstrations, and hands-on labs, participants explore and deploy the components of a secure GCP solution, including Cloud Identity, the GCP Resource Manager, Cloud IAM, Google Virtual Private Cloud firewalls, Google Cloud Load balancing, Cloud CDN, Cloud Storage...
If you want to know more about blockchain, then this course is for you. Business is currently dealing intensively with digitisation. Blockchain has a major impact on the design and implementation of digital business processes in many application areas such as Internet of Things, the Smart Grid,...
In this MOOC, we will learn about TOR basic concept and see how they protect the security and privacy of users and resist censorship. We will examine how TOR realize the anonymity and utilize its service by downloading and using Tor browser software. A recent attack on TOR\'s application flow...
This is Course 3 in the Introduction to Blockchain course series. Blockchain technology is in a period of exceptional growth, and the accounting profession will play a significant role in driving its adoption. Be part of the blockchain evolution with this course. Starting with a focus on the...
This is Course 1 in the Introduction to Blockchain course series. Blockchain technology is in a period of exceptional growth, and the accounting profession will play a significant role in driving its adoption. Be part of the blockchain evolution with this course. Starting with a focus on the...
This is Course 2 in the Introduction to Blockchain course series. Blockchain technology is in a period of exceptional growth, and the accounting profession will play a significant role in driving its adoption. Be part of the blockchain evolution with this course. Starting with a focus on the...

Security Online Courses for Concord Students

Searching for Concord Security online courses has never been quicker. Browse Security online courses and more in and around Athens, WV. To help narrow your results down, use Security online course filters to refine your Concord Security online course search and enhance your Biology search experience. Sharing relevant Security listings with Concord University classmates can really help make the search process even faster for them! Uloop.com can help you find Concord Security online courses today!

Concord Online Courses

Back to Top

Log In

Contact Us

Upload An Image

Please select an image to upload
Note: must be in .png, .gif or .jpg format
OR
Provide URL where image can be downloaded
Note: must be in .png, .gif or .jpg format

By clicking this button,
you agree to the terms of use

By clicking "Create Alert" I agree to the Uloop Terms of Use.

Image not available.

Add a Photo

Please select a photo to upload
Note: must be in .png, .gif or .jpg format