Introduction to the principles, mechanisms, policies, and implementation for computer security; learn how attacks are carried out, how to defend against attacks, and how to design systems to withstand them.
Introduction to the principles, mechanisms, policies, and implementation for computer security; learn how attacks are carried out, how to defend against attacks, and how to design systems to withstand them.
A leader in interdisciplinary research and education
As the first school of its kind in the United States, the Indiana University Luddy School of Informatics, Computing, and Engineering is an innovator in a fast-paced and dynamic field. Our school on the IUPUI campus integrates computing, social science, and information systems design in unique ways.
More than 4,500 students—including over 1,400 at Luddy IUPUI—study informatics on IU campuses. Our top-notch programs and highly regarded faculty prepare them for the power and possibilities in computing and information technology.
This course introduces students to the field of, and concepts and principles of cybersecurity. Students will be introduced to various security topics including security awareness through discussing common security threats and attacks, cybersecurity infrastructure, cryptography, and an overview of r...
In this course, you will learn the basic concepts and skills necessary to configure Check Point Next Generation Firewalls. During this course, you will configure a security policy and learn about managing and monitoring a secure network, upgrading and configuring a security gateway, and implementin...
Cyber Security certifications and careers are in high demand. Cyber security refers to the body of knowledge, technologies and processes designed to protect networks, devices, and programs from unauthorized access.
This course provides a foundation of knowledge in the information technology security field. Students will learn general network security concepts; compliance and operational security; threats and vulnerabilities; application, data, and host security.
This toolkit features video lectures contributed by Industry Expansion Solutions, the NC Manufacturing Extension Partnership, the NC Military Business Center, and the Laboratory of Analytic Sciences at NC State University.
© 2024 coursetakers.com All Rights Reserved. Terms and Conditions of use | Privacy Policy