Computer Security and Networks Online Courses for TTUHSC Students

Found 48 listings, displaying 1-20
Filter:
The sudden rise in the value of Bitcoin and other cryptocurrencies, and its subsequent decline, focused the world\'s attention on cryptocurrencies as a means of payment. Blockchain technology powers Bitcoin and has been hyped as the next new, transformative technology. In this course, we first...
Introduction to Google Workspace Administration is the first course in the Google Workspace Administration series of courses. This series will serve as the starting place for any new Google Workspace admin as they begin their journey of managing and establishing Google Workspace best practices...
Introduction to Cyber Security was designed to help learners develop a deeper understanding of modern information and system protection technology and methods. The learning outcome is simple: We hope learners will develop a lifelong passion and appreciation for cyber security, which we are...
The current global financial system is riddled with inefficiencies, uneven developments, and bizarre contradictions. Blockchain technology has the potential to bring about profound changes to financial services. In this course, you will learn how blockchain technology will disrupt the core...
In this fourth and final course of the specialization, you will synthesize your learning into a Strategic Action Plan. The goals of this course are twofold: One, it\'s for you to identify a specific need or problem within the financial services industry that can potentially be solved using...
This specialization is developed for seniors and fresh graduate students to understand fundamental network architecture concepts and their impacts on cyber security, to develop skills and techniques required for network protocol design, and prepare for a future of constant change through exposure...
Deep learning added a huge boost to the already rapidly developing field of computer vision. With deep learning, a lot of new applications of computer vision techniques have been introduced and are now becoming parts of our everyday lives. These include face recognition and indexing, photo...
This second course of the Blockchain specialization will help you design, code, deploy and execute a smart contract - the computational element of the blockchain technology. Smart contracts allow for implementing user-defined operations of arbitrary complexity that are not possible through plain...
\'Megatrends\' heavily influence today\'s organisations, industries and societies, and your ability to generate insights in this area is crucial to your organisation\'s success into the future. This course will introduce you to analytical tools and skills you can use to understand, analyse and...
In this capstone, learners will apply their deep learning knowledge and expertise to a real world challenge. They will use a library of their choice to develop and test a deep learning model. They will load and pre-process data for a real problem, build the model and validate it. Learners will...
Welcome to Supply Chain Analytics - the art and science of applying data analytics to assess and improve supply chain performance! A supply chain is a complex system with conflicting objectives of cost efficiency and customer satisfaction. Supply chain management is becoming increasingly data...
This specialization has been developed to help administrators master the foundations of establishing and managing Google Workspace for their organization. You will set up a new Google Workspace account, and explore provisioning options. You will learn how to manage users and become familiar with...
The Computer Security and Systems Management Specialization focuses on computing in an enterprise environment. Combining both theory and real world experience and architecture, the courses will prepare you to design and audit secure enterprise systems. The courses will cover practical use of...
It seems anymore that you can\'t listen to the news without hearing of a data breach. You may have heard it said before that there are 2 types of companies out there, the ones who have been breached and those who will be breached. Defending against attackers who want to compromise assets can seem...
Cybersecurity is an essential business skill for the evolving workplace. For-profit companies, government agencies, and not-for-profit organizations all need technologically proficient, business-savvy information technology security professionals. In this Specialization, you will learn about a...
Learn SAS or Python programming, expand your knowledge of analytical methods and applications, and conduct original research to inform complex decisions. The Data Analysis and Interpretation Specialization takes you from data novice to data expert in just four project-based courses. You will...
This course will teach you how to develop an embedded systems device. In order to reduce the time to market, many pre-made hardware and software components are available today. You\'ll discover all the available hardware and software components, such as processor families, operating systems,...
This course introduces the basics of cyber defense starting with foundational models such as Bell-LaPadula and information flow frameworks. These underlying policy enforcements mechanisms help introduce basic functional protections, starting with authentication methods. Learners will be...
Perhaps no other relic of the European Middle Ages captures our imagination more than illuminated medieval manuscripts, or those documents decorated with images and colored pigments. Serving as windows unto a lost world of kings, ladies, faith, war, and culture, they communicate complex visual...
This course is designed to show you how use quantitative models to transform data into better business decisions. You\'ll learn both how to use models to facilitate decision-making and also how to structure decision-making for optimum results. Two of Wharton\'s most acclaimed professors will show...

Computer Security and Networks Online Courses for TTUHSC Students

Searching for TTUHSC Computer Security and Networks online courses has never been quicker. Browse Computer Security and Networks online courses and more in and around Lubbock, TX. To help narrow your results down, use Computer Security and Networks online course filters to refine your TTUHSC Computer Security and Networks online course search and enhance your Biology search experience. Sharing relevant Computer Security and Networks listings with Texas Tech University Health Sciences Center classmates can really help make the search process even faster for them! Uloop.com can help you find TTUHSC Computer Security and Networks online courses today!

TTUHSC Online Courses

Back to Top

Log In

Contact Us

Upload An Image

Please select an image to upload
Note: must be in .png, .gif or .jpg format
OR
Provide URL where image can be downloaded
Note: must be in .png, .gif or .jpg format

By clicking this button,
you agree to the terms of use

By clicking "Create Alert" I agree to the Uloop Terms of Use.

Image not available.

Add a Photo

Please select a photo to upload
Note: must be in .png, .gif or .jpg format