Filter by
The language used throughout the course, in both instruction and assessments.
1,081 results for "information security"
University of Colorado System
Skills you'll gain: Cryptography, Security Engineering, Algorithms, Mathematics, Theoretical Computer Science, Critical Thinking, Mathematical Theory & Analysis, System Security, Computer Security Models, Cyberattacks, Probability Distribution, Software Security, Applied Mathematics, Computational Logic, BlockChain, Computational Thinking, Leadership and Management
University of Colorado System
Skills you'll gain: Operating Systems, System Software, System Programming, Leadership and Management
Microsoft
University of Colorado System
Skills you'll gain: Critical Thinking, Cryptography, Computer Security Models, Mathematical Theory & Analysis, Mathematics, Probability Distribution, Security Engineering, Software Security, System Security
Skills you'll gain: Python Programming
Interactive Brokers
Skills you'll gain: Finance, Investment Management, Financial Analysis, Leadership and Management, Risk Management, Securities Trading, Financial Management, Market Analysis, Strategy, Strategy and Operations, Business Analysis, Accounting, Data Analysis, Securities Sales, Taxes
Skills you'll gain: Customer Success, Customer Support, Networking Hardware
Skills you'll gain: Computer Security Incident Management, Leadership and Management, Security Engineering, System Security, Network Security, Risk Management, Software Security, Cyberattacks, Security Software, Process Analysis
Skills you'll gain: Databases, Python Programming, SQL, Data Management, Data Mining, Data Visualization, Data Warehousing, NoSQL, R Programming, Business Intelligence, Data Analysis
University of California, Irvine
Skills you'll gain: Leadership and Management, Risk Management
Skills you'll gain: Databases, Database Administration
In summary, here are 10 of our most popular information security courses
- Applied Cryptography:Â University of Colorado System
- Linux Server Management and Security:Â University of Colorado System
- Cybersecurity Solutions and Microsoft Defender:Â Microsoft
- Secure Your Data at Rest:Â Microsoft
- Cryptography and Information Theory:Â University of Colorado System
- Credential Access, discovery, lateral movement & collection:Â Infosec
- Practical Guide to Trading:Â Interactive Brokers
- Technical Support (IT) Case Studies and Capstone:Â IBM
- Identifying, Monitoring, and Analyzing Risk and Incident Response and Recovery:Â ISC2
- Business Intelligence (BI) Essentials:Â IBM