Filter by
The language used throughout the course, in both instruction and assessments.
Results for "computer-ethik"
Infosec
Skills you'll gain: Software Security
University of Leeds
University of Colorado Boulder
Skills you'll gain: Kubernetes, Network Security, Software-Defined Networking
Skills you'll gain: BlockChain, Planning
University of California, Davis
Skills you'll gain: Security Engineering, Computer Programming, Software Security
University of Illinois Urbana-Champaign
Skills you'll gain: Computer Networking, Network Architecture, Internet Of Things
EIT Digital
University of Colorado System
Skills you'll gain: Critical Thinking, Cryptography, Computer Security Models, Mathematical Theory & Analysis, Mathematics, Probability Distribution, Security Engineering, Software Security, System Security
Johns Hopkins University
- Status: Free
The University of Melbourne
Skills you'll gain: Computer Programming
Multiple educators
Skills you'll gain: Computer Security Incident Management, Leadership and Management, Risk Management, Cloud Computing, System Security, Cloud Storage, Computer Networking, Operating Systems, Network Security, Cloud Applications, Network Architecture, Networking Hardware, Cloud Infrastructure, Cloud Platforms, Computer Programming, Cyberattacks, Databases, Security Engineering, Cryptography, DevOps, IBM Cloud, Operations Management, Software Engineering
University of Colorado Boulder
Skills you'll gain: Estimation, Mathematics, Algorithms, Probability & Statistics, Mathematical Theory & Analysis, Systems Design, Research and Design, General Statistics, Critical Thinking, Computer Programming, Algebra, Product Design, Correlation And Dependence, Design and Product, Linear Algebra, Process Analysis, Data Analysis, Data Model, Material Handling, Leadership and Management, Probability Distribution, Product Lifecycle, Regression
In summary, here are 10 of our most popular computer-ethik courses
- OWASP Top 10 - 2021: Infosec
- How to Get Into AI: University of Leeds
- Network Systems: Principles in Practice: University of Colorado Boulder
- Blockchain in Financial Services: Strategic Action Plan: INSEAD
- Identifying Security Vulnerabilities in C/C++Programming: University of California, Davis
- IoT Networking: University of Illinois Urbana-Champaign
- Geometric Algorithms: EIT Digital
- Cryptography and Information Theory: University of Colorado System
- Data Science Decisions in Time:Sequential Hypothesis Testing: Johns Hopkins University
- Basic Modeling for Discrete Optimization: The University of Melbourne