IT Security: Defense against the digital dark arts
This course covers a wide variety of IT security concepts, tools, and best practices. It introduces threats and attacks and the many ways they can show up. We'll give you some background of encryption algorithms and how they're used to safeguard data. Then, we'll dive into the three As of information security: authentication, authorization, and accounting. We'll also cover network security solutions, ranging from firewalls to Wifi encryption options. read more...
Machine Learning In The Cloud With Azure
The history of data science, machine learning, and artificial Intelligence is long, but it’s only recently that technology companies - both start-ups and tech giants across the globe have begun to get excited about it… Why? Because now it works. read more...
Network Protocols and Architecture
Welcome to the second of five courses in the Cisco Networking Basics Specialization. Have ever wondered how devices on computer networks truly communicate? There are specific protocols or rules and standards that every device must follow to access the Internet and to communicate over a network. read more...
Networking and Security Architecture with VMware NSX
This 8 week online course equips learners with the basics of network virtualization with VMware NSX. To get the most of this course, you should have familiarity with generic IT concepts of routing, switching, firewalling, disaster recovery, business continuity, cloud and security. read more...
Programming Languages, Part A
This course is an introduction to the basic concepts of programming languages, with a strong emphasis on functional programming. read more...
Programming Languages, Part B
This course is part of an introduction to the basic concepts of programming languages, with a strong emphasis on functional programming. read more...
The Bits and Bytes of Computer Networking
This course is designed to provide a full overview of computer networking. We'll cover everything from the fundamentals of modern networking technologies and protocols to an overview of the cloud to practical applications and network troubleshooting. We'll wrap up by covering how this information might show up in a job interview and giving you a few tips for troubleshooting on the spot. read more...
The Complete Cyber Security Course! Volume 1 : Hackers Exposed
This course covers the fundamental building blocks of your required skillset - You will understand the threat and vulnerability landscape through threat modelling and the risk assessment. read more...
Ultimate Ethical Hacking Boot Camp – Beginner to Pro
Learn Ethical Hacking from a world famous Ethical Hacker who has professional endorsements from people like Mark Cuban Billionaire tech entrepreneur, Star of Shark Tank, and the legendary cyber security expert John McAfee. read more...