Introduction to PC Security

Learn why you’re at risk and what you can do to protect your precious personal and business data from the outside world. This course will quickly bring you up to speed on the fundamentals of PC and network security. You will understand and explore the vulnerability of operating systems, software, and networks. Then, you will get into the minds…

Introduction to Cryptography – CyberSecurity Programme

Cryptography is the practice of techniques used to protect the secure transmission of information. This course is an excellent starting point to understand what is cryptography, learn how cryptography is used, and understand hash, symmetric, and asymmetric cryptographic algorithms. You will learn the inner workings of security encryption and cryptographic systems and how to correctly use them in real-world…

Intermediate Networking

Learn real-world applications for the concepts you learned in Introduction to Networking. Continue to build your knowledge of networks and networking, with detailed treatments of TCP/IP, how switches and routers operate, DNS, and more. You will gain a full understanding of almost every aspect of networking technology, including hot topics such as virtual private networks, security, Internet connectivity, and…

Introduction to Networking

Introduction to Networking explains computer networking basics in easy to understand terms, using concepts common to everyday, non-computing experience. A brief introduction explains how networks have become so important to businesses and individuals. This course emphasizes networking fundamentals, explaining the software and hardware that makes networking possible. On completion of the course, you will be capable of performing basic…

Introduction to Mobile Security

Mobile devices continue to grow in importance in managing our personal and business lives. As such, it makes them particularly vulnerable to attacks and how to defend against them. This course is an excellent starting point to understand the different types of mobile devices, understand the risks associated with mobile devices, develop a list of ways to secure mobile…