Security Online Courses for TTUHSC Students

Found 48 listings, displaying 21-40
Filter:
This course delves into intellectual property (IP) with an introduction into the innovation landscape within the UK and how that compares with other settings. You\'ll focus on how intellectual property applies to frugal innovations, compulsory licensing, and when and how to apply for intellectual...
Today organizations are either embracing digital technologies to improve their businesses or being disrupted by entrants with such capabilities. Therefore it is important for managers and executives of all organizations to learn about various technologies and apply them in innovative ways. Some...
This course will help you build a foundation of some of the fundamental concepts in secure programming. We will learn about the concepts of threat modeling and cryptography and you\'ll be able to start to create threat models, and think critically about the threat models created by other people...
Security should be your first priority when developing cloud native applications. The goal of this course is to provide you with foundational knowledge and skills that will enable you to grow in your use of both AWS IAM and the rest of the AWS ecosystem. Throughout the course, the focus will be...
Introduction to Cloud Identity serves as the starting place for any new Cloud Identity, Identity/Access Management/Mobile Device Management admins as they begin their journey of managing and establishing security and access management best practices for their organization. This 15-30 hour...
This course it the first part of the Python for Cybersecurity Specialization. Learners will get an introduction and overview of the course format and learning objectives.Created by: InfosecLanguage: English...
Learn how to monitor, troubleshoot, and improve your infrastructure and application performance. Guided by the principles of Site Reliability Engineering (SRE), this course features a combination of lectures, demos, hands-on labs, and real-world case studies. In this course, you\'ll gain...
In this 2-hour long tutorial, you will learn how to create, and configure a Microsoft Azure Database for MySQL server and database. We will do this by walking through the process of creating a free trial subscription on Azure, logging in and getting familiar with the Azure Portal. We will create...
This course gives you the background needed to understand basic network security. You will learn the about Local Area Networks, TCP/IP, the OSI Framework and routing basics. You will learn how networking affects security systems within an organization. You will learn the network components that...
In this course, you will learn all about the process of implementing effective education, training, and awareness programs. You will also study the role personnel security plays in protecting an organization\'s assets, intellectual property, and physical assets. You will also be introduced to the...
I\'ve heard this before - \"I\'m not sure my computer security practices are working\". I reply \"Have you tested them?\" This course is the fourth and final course in the Practical Computer Security specialization. In this course, you\'ll learn how to proactively test what you have put in place...
The Cyber Incident Response course will give students an understanding of how incidents are responded to at a high level, as well as allow them to build important technical skills through the hands-on labs and projects. This course starts with a high-level discussion of what happens at each phase...
Microsoft Windows has been at the forefront of enterprise computing for several decades. What most office workers see is the desktop side - such as Windows 7, 8 or 10. This course explores what it takes to design and build the server side of Windows in an enterprise environment. This course will...
This course sensitizes regarding privacy and data protection in Big Data environments. You will discover privacy preserving methodologies, as well as data protection regulations and concepts in your Big Data system. By the end of the course, you will be ready to plan your next Big Data project...
Computer attacks and data breaches are inevitable. It seems like every day a data breach occurs and the victims of the data breach suffer. Their information is stolen or posted online. The company\'s or businesses who had the breach go on, learn a little from the attack, and just give credit...
Social and emotional learning, or SEL, programs have flourished in schools during the last decade. In this course the instructors (Emily Price and Ben Kirshner) introduce and help you examine community based and youth-empowerment approaches to social and emotional learning. Some of these...
The Windows OS Forensics course covers windows file systems, Fat32, ExFat, and NTFS. You will learn how these systems store data, what happens when a file gets written to disc, what happens when a file gets deleted from disc, and how to recover deleted files. You will also learn how to correctly...
In this MOOC, you will learn the history of DDoS attacks and analyze new Mirai IoT Malware and perform source code analysis. you will be provided with a brief overview of DDoS Defense techniques. You learn an Autonomous Anti-DDoS Network called A2D2 for small/medium size organizations to deal...
This capstone is the last course in the Data Analytics in Accountancy Specialization. In this capstone course, you are going to take the knowledge and skills you have acquired from the previous courses and apply them to a real-world problem. You will be provided with a loan dataset from Lending...
This Azure training course is designed to equip students with the knowledge need to process, store and analyze data for making informed business decisions. Through this Azure course, the student will understand what big data is along with the importance of big data analytics, which will improve...

Security Online Courses for TTUHSC Students

Searching for TTUHSC Security online courses has never been quicker. Browse Security online courses and more in and around Lubbock, TX. To help narrow your results down, use Security online course filters to refine your TTUHSC Security online course search and enhance your Biology search experience. Sharing relevant Security listings with Texas Tech University Health Sciences Center classmates can really help make the search process even faster for them! Uloop.com can help you find TTUHSC Security online courses today!

TTUHSC Online Courses

Back to Top

Log In

Contact Us

Upload An Image

Please select an image to upload
Note: must be in .png, .gif or .jpg format
OR
Provide URL where image can be downloaded
Note: must be in .png, .gif or .jpg format

By clicking this button,
you agree to the terms of use

By clicking "Create Alert" I agree to the Uloop Terms of Use.

Image not available.

Add a Photo

Please select a photo to upload
Note: must be in .png, .gif or .jpg format