Filter by
The language used throughout the course, in both instruction and assessments.
Results for "challenges+and+fundamental+concepts+in+security+and+privacy"
Universidad de los Andes
Skills you'll gain: Computer Security Incident Management, Cryptography, Computer Programming, Computer Security Models, Software Security, System Software, Critical Thinking, Network Security, System Security, User Experience
- Status: Free
EIT Digital
Skills you'll gain: Big Data, Data Management, Security Engineering, Security Strategy
EIT Digital
Skills you'll gain: Big Data, Computer Security Incident Management, Data Management, Network Security, Security Engineering, Security Strategy, Software Security, System Security, Computer Security Models, Cyberattacks
Akamai Technologies, Inc.
Skills you'll gain: Computer Security Incident Management, Mobile Security, Network Security, Risk Management
Google Cloud
University of Michigan
Skills you'll gain: Human Computer Interaction, Security Engineering, Software Security, Human Factors (Security), System Security, Security Software, Security Strategy
Microsoft
Skills you'll gain: Leadership and Management, Operations Management, Security Engineering, System Security, Computer Security Incident Management, Software Security, Strategy and Operations, Network Security, Security Software, Risk Management
University of California, Irvine
Skills you'll gain: Leadership and Management, Strategy
- Status: Free
Coursera Instructor Network
University of London
Skills you'll gain: Computer Security Incident Management, Computer Security Models, Cryptography, Leadership and Management, Mobile Security, Risk Management, Security Engineering, System Security
In summary, here are 10 of our most popular challenges+and+fundamental+concepts+in+security+and+privacy courses
- Principios y Regulaciones de Seguridad de la Información: Universidad de los Andes
- Security and Privacy for Big Data - Part 2:Â EIT Digital
- Security and Privacy for Big Data - Part 1:Â EIT Digital
- Introduction to IT Security:Â Akamai Technologies, Inc.
- Access Control Concepts:Â ISC2
- Strategies for Cloud Security Risk Management:Â Google Cloud
- Securing Digital Democracy:Â University of Michigan
- Cybersecurity and Privacy:Â Microsoft
- Security Operations and Administration:Â ISC2
- Security Governance & Compliance:Â University of California, Irvine