Access Controls
The Access Controls Course provides information pertaining to specify what users are permitted to do, the resources they are allowed to access, and what operations they are able to perform on a system. read more...
Cryptography I
In this course you will learn the inner workings of cryptographic systems and how to correctly use them in real-world applications. read more...
Cryptography II
In this course you will learn the inner workings of cryptographic systems and how to correctly use them in real-world applications. read more...
Introduction to Blockchain: Benefits, Values and Opportunities
Blockchain technology is in a period of exceptional growth, and the accounting profession will play a significant role in driving its adoption. read more...
Introduction to Blockchain: Using and Securing Cryptocurrencies
Blockchain technology is in a period of exceptional growth, and the accounting profession will play a significant role in driving its adoption. read more...
IT Security: Defense against the digital dark arts
This course covers a wide variety of IT security concepts, tools, and best practices. It introduces threats and attacks and the many ways they can show up. We'll give you some background of encryption algorithms and how they're used to safeguard data. Then, we'll dive into the three As of information security: authentication, authorization, and accounting. We'll also cover network security solutions, ranging from firewalls to Wifi encryption options. read more...
Networking and Security Architecture with VMware NSX
This 8 week online course equips learners with the basics of network virtualization with VMware NSX. To get the most of this course, you should have familiarity with generic IT concepts of routing, switching, firewalling, disaster recovery, business continuity, cloud and security. read more...
The Bits and Bytes of Computer Networking
This course is designed to provide a full overview of computer networking. We'll cover everything from the fundamentals of modern networking technologies and protocols to an overview of the cloud to practical applications and network troubleshooting. We'll wrap up by covering how this information might show up in a job interview and giving you a few tips for troubleshooting on the spot. read more...