Filter by
The language used throughout the course, in both instruction and assessments.
1,014 results for "computer security"
University System of Georgia
Skills you'll gain: Computer Security Incident Management, Leadership and Management, Planning, Risk Management, Security Engineering, Strategy and Operations, System Security, Business Analysis, Operations Management, Operating Systems
University of London
Skills you'll gain: Javascript, Web Development, Front-End Web Development, HTML and CSS, Web Design, Database Application, Databases, Web Development Tools
University of Colorado Boulder
Skills you'll gain: Algorithms, Data Science
Royal Holloway, University of London
University of California, Davis
Skills you'll gain: Security Engineering, Computer Programming, Software Security
University of California, Irvine
Skills you'll gain: Microsoft Excel
University of California, Davis
Skills you'll gain: Security Engineering, Software Security, Security Software, System Security, Java Programming
University of Illinois at Urbana-Champaign
Skills you'll gain: Finance, Financial Analysis, Financial Management, Investment Management, Leadership and Management, Financial Accounting, Corporate Accouting, Market Analysis, Risk Management, Securities Trading
Microsoft
University of Colorado System
Skills you'll gain: Cyberattacks, Network Security, Security Engineering, Software Security, Computer Networking, Computer Security Incident Management, System Security, Cloud Computing, Computer Security Models, Security Software
University of Colorado System
Skills you'll gain: Network Security, Security Engineering, System Security, Computer Security Models, Cryptography, Computer Security Incident Management, Cyberattacks, Leadership and Management, Risk Management, Software Security
Searches related to computer security
In summary, here are 10 of our most popular computer security courses
- AWS: CI/CD Pipelines and Deployment Strategies:Â Whizlabs
- Managing Cybersecurity Incidents and Disasters:Â University System of Georgia
- Introduction to Meteor.js Development:Â University of London
- Ethical Issues in Data Science:Â University of Colorado Boulder
- Cybercrime:Â Royal Holloway, University of London
- Identifying Security Vulnerabilities in C/C++Programming:Â University of California, Davis
- Productivity and Systems Development:Â University of California, Irvine
- Exploiting and Securing Vulnerabilities in Java Applications:Â University of California, Davis
- Introduction to Finance: The Role of Financial Markets:Â University of Illinois at Urbana-Champaign
- Implement Platform Protection:Â Microsoft