Filter by
The language used throughout the course, in both instruction and assessments.
1,014 results for "computer security"
Skills you'll gain: Cloud API, Cloud Computing, Cloud Platforms, Google Cloud Platform, Cloud Applications, Application Development, Cloud Infrastructure, Computer Architecture, Software Architecture, Other Cloud Platforms and Tools
Skills you'll gain: Leadership and Management, Generally Accepted Accounting Principles (GAAP), Human Resources, Machine Learning, Product Development, Strategy, Computer Architecture, Conflict Management, Data Management, Human Computer Interaction, Business Analysis
University System of Georgia
Skills you'll gain: Computer Security Incident Management, Leadership and Management, Planning, Risk Management, Security Engineering, Strategy and Operations, System Security, Business Analysis, Operations Management, Operating Systems
University of London
Skills you'll gain: Javascript, Web Development, Front-End Web Development, HTML and CSS, Web Design, Database Application, Databases, Web Development Tools
University of Colorado Boulder
Skills you'll gain: Algorithms, Data Science
Royal Holloway, University of London
University of California, Irvine
Skills you'll gain: Microsoft Excel
University of Illinois at Urbana-Champaign
Skills you'll gain: Finance, Financial Analysis, Financial Management, Investment Management, Leadership and Management, Financial Accounting, Corporate Accouting, Market Analysis, Risk Management, Securities Trading
Microsoft
University of Colorado System
Skills you'll gain: Cryptography, Algorithms, Security Engineering, Mathematics, Theoretical Computer Science, Mathematical Theory & Analysis, Computational Logic, Computational Thinking, Critical Thinking, System Security
University of Colorado System
Skills you'll gain: Cryptography, Algorithms, Security Engineering, Mathematics, Applied Mathematics, Cyberattacks
Searches related to computer security
In summary, here are 10 of our most popular computer security courses
- Securing and Integrating Components of your Application:Â Google Cloud
- Turn Ethical Frameworks into Actionable Steps:Â CertNexus
- AWS: CI/CD Pipelines and Deployment Strategies:Â Whizlabs
- Managing Cybersecurity Incidents and Disasters:Â University System of Georgia
- Introduction to Meteor.js Development:Â University of London
- Ethical Issues in Data Science:Â University of Colorado Boulder
- Cybercrime:Â Royal Holloway, University of London
- Productivity and Systems Development:Â University of California, Irvine
- Introduction to Finance: The Role of Financial Markets:Â University of Illinois at Urbana-Champaign
- Implement Platform Protection:Â Microsoft