Course in Computer Security

Top Courses in Computer Security

Computer Security

Computer security is an increasingly important field of study as people become more reliant on technology. A course in computer security is a quick way to pad a resume while working toward a computer-related degree.

What is a course in computer security? Courses in computer security tend to look at the foundations of software security and the utilization of code and cryptography to adequately secure networks and information systems. Depending on where the courses are taken, completion of an entire program could result in a certificate. Courses of study often last for approximately one year and might also be used to work toward a degree in information systems. Courses may range from introductory classes for those unfamiliar with code and cryptography to advanced courses involving engineering of software

Many computer security courses are available online, which makes them flexible and accessible to nearly anyone with internet access. Courses are rather short, which also means earning a certificate does not take much time. It can be a good option for students and professionals alike.

How much a computer security course costs depends on the institution providing the course and the length of study. To learn more about all of the costs involved with your course of choice, contact the admission office of the school providing the course.

There are many different careers associated with courses in computer security. Some jobs may require a degree. With the proper education and a certificate in computer security, graduates may be able to find work as a forensic analyst, information security crime investigator, malware analyst, security auditor, vulnerability researcher, security software developer, disaster recovery and a variety of other positions. There are many different positions available with private businesses, public companies and government agencies.

It is more important than ever to gain an understanding in computer security. To learn more about courses involving security of information systems, networks and more, search for your program below and contact directly the admission office of the school of your choice by filling in the lead form.

 

 

Read More

course - computer security

Campus Universitario Europeo
Online Full time Part time 6 months September 2019 Spain Marbella A Coruña Madrid + 3 more

The increased use of computers and communication systems that store, process and share large amounts of information is being dramatically in [+]

Course - Computer Security The increasing use of computers and communication systems that store, process and share large amounts of information is being dramatically in recent years. This fact causes, increasingly, a larger number of organizations consider their information and technology associated with it, as one of your most important assets. In the same manner as required for the other assets of the company, the quality requirements and information security are indispensable. The company management should establish a security system suitable to support and ensure correct operation of the business processes. Moreover, today there are laws such as the Protection of Personal Data, to require compliance with a set of minimum security measures to protect the infor- formation of people. These laws, today, affecting almost all companies. This course aims to address computer security in the business analyzing the possible hazards and measures to be implemented to ensure the proper functioning of the systems and and their protection.... [-]


5 day Certified Cloud Security Professional (CCSP)

International Management Forum Academy
Campus Full time 5 days February 2019 Netherlands Eindhoven

This 5-day training will prepare you for the newest international Cloud Security certificate of (ISC)2: Certified Cloud Security Professional (CCSP) [+]

Certified Cloud Security Professional (CCSP) – mode of study Option 1: 5-day public training Option 2: in-company trainingAlternative training: 3-day CCSK (Certificate of Cloud Security Knowledge) training from the Cloud Security Alliance (CSA) Get global Cloud Security recognition with the Certified Cloud Security Professional (CCSP) title!

Many companies have concerns about adopting Cloud architecture due to the inherent security risks. This new training and certification - developed by the leading information security organization (ISC)2 in cooperation with the Cloud Security Alliance (CSA) - will prove your Cloud Security expertise at a global level.

In this Certified Cloud Security Professional (CCSP) training you will get the Cloud Security skills you need to manage Cloud environments and purchase Cloud services. ... [-]


3 day Cloud Security (CCSK) Course

International Management Forum Academy
Campus Full time 3 days January 2019 Netherlands Eindhoven

3-day training preparing you for the Certificate of Cloud Security Knowledge (CCSK), the industry's first vendor-independent Cloud Security certification from the Cloud Security Alliance (CSA) [+]

Cloud Security mode of Study Option 1: Public course 3-day Certification Programme Option 2: In-house training CCSK a solid foundation in Cloud Security issues and best practices

This 3-day training prepares you for the Certificate of Cloud Security Knowledge (CCSK) and covers all domain topics outlined by the Cloud Security Alliance (CSA) and the recommendations from the European Network and Information Security Agency (ENISA). The CCSK credential will provide foundational requirements for any future certifications that focus on specific professions, management or technical skills.

Cloud Security (CCSK) the industry's first Cloud Security certification

The CCSK is strongly supported by a broad coalition of experts and organisations from around the world. The collaboration between CSA and ENISA means that the world's two leading organisations for vendor-neutral Cloud Security research are providing the foundation for the industry's first Cloud Security certification.... [-]


Course: STEM Themes Gap Year Programme

Oxford Royale Academy
Campus Full time 10 - 10 weeks September 2019 United Kingdom Yarnton

Expert tuition and project work in Science, Technology, Engineering and Mathematics Themes for Gap Year students. [+]

The Science, Technology, Engineering and Mathematics (STEM) Themes Gap Year programme strengthens students’ knowledge and encourages them to further explore topics through individual extended project work.

Introduction to STEM themes

The STEM Themes Gap Year programme is ideal for students willing to challenge their existing knowledge and to develop their quantitative and research skills in preparation for a university degree or a work placement. Small core classes led by experienced teachers enable students to ascertain their understanding of the topics covered, while a selection of elective classes helps them develop new competencies. Students are also encouraged to think creatively to tackle topical issues.... [-]


Course CompTIA IT Fundamentals (FC0-U51)

E-Careers
Online Part time Open Enrollment United Kingdom UK Online Slough

Seek opportunities in the IT industry by gaining the vital knowledge encompassed in this CompTIA IT Fundamentals course which covers the foundational computing concepts from hardware to IT security. [+]

What are the objectives of this course?

From a basic introduction to common computer components through to advanced techniques in maintaining security and performance of a desktop PC, students will have a good understanding of common PC issues and how to resolve them.

The basic principles and use of operating systems like Microsoft Windows. Managing software and file types. Understanding computer peripherals and common ports and connectors used by modern PC hardware. Identifying and protecting against basic security threats and surfing the web safely. Building and configuring a basic network and sharing data with other network users. The basic use of a computer workstation, operating system, and software. Simple troubleshooting techniques and safety techniques. Who is it intended for? ... [-]

EC-Council Certified Courses

Zeus Consulting
Campus Full time 5 days September 2019 United Arab Emirates Dubai

Zeus Consulting is Accredited Trainings Centre of EC-Council. All EC-Council programs are delivered by certified trainers. [+]

Zeus Consulting is Accredited Trainings Centre of EC-Council. All EC-Council programs are delivered by certified trainers.

EC-Council - Disaster Recovery Professional

The EDRP course teaches you the methods in identifying vulnerabilities and takes appropriate countermeasures to prevent and mitigate failure risks for an organization. It also provides the networking professional with a foundation in disaster recovery principles, including preparation of a disaster recovery plan, assessment of risks in the enterprise, development of policies, and procedures, and understanding of the roles and relationships of various members of an organization, implementation of the plan, and recovering from a disaster.... [-]


Computer Security and Investigations

Fleming College
Campus Full time 6 semesters September 2019 Canada Peterborough Lindsay Minden Cobourg + 3 more

The Computer Security and Investigations program is designed to provide you with the necessary knowledge and skills to take a leadership role in the protection and security of information technology. [+]

The Computer Security and Investigations program is designed to provide you with the necessary knowledge and skills to take a leadership role in the protection and security of information technology.

Program Highlights

The Computer Security and Investigations program is designed to provide you with the necessary knowledge and skills to take a leadership role in the protection and security of information technology. Your classes are regularly reviewed and improved to be the most current subjects demanded by the industry, such as:

Advanced Ethical Hacking Threat and Risk Analysis Information Security Advanced Computer Forensics Internet and Hacking Investigations CISCO Network Design and Management Network Security Criminology Justice Studies ... [-]

Master Ethical Hacking & Penetration Testing By Kali Linux

BitDegree
Online Open Enrollment Lithuania 139 - 309

Learn How Expert Hackers Perform Penetration Testing and Security Audits Using Kali Linux Tools [+]

About

Ethical hackers (sometimes called white hat hackers) are security professionals, who find and exploit vulnerabilities and weaknesses in various systems to make sure that these systems are fixed and become as safe as possible.

In this course, you will learn what is Ethical Hacking all about and how to use Kali Linux for white hat operations.

Learn Ethical Hacking from the Basics

You will start this course by learning how to install Kali Linux on your computer and how to work with it appropriately. You will build your skills and knowledge about various security threats in information, networks, and other systems, with each lecture taking them to the next level.

You will learn how to gather information with different methods (for example fingerprinting and open ports). You will also find out how to exploit the vulnerability with varying parameters in the system you are using. When you complete this course, you will be able to use ethical hacking and the tools that Kali Linux provides to protect your system from hackers.... [-]


Data Security (Technical) - an online course

Southampton Data Science Academy
Online Part time 6 weeks May 2019 United Kingdom Cambridge

This course equips you with the practical knowledge to securely manage personal data as defined in the General Data Protection Regulations. It requires a basic understanding of web-based systems and networking, level 3 BTEC or higher. You will learn how to assess vulnerabilities to a known IT system and how to reduce those threat vectors. [+]

About this course

This course equips you with the practical knowledge to securely manage personal data as defined in the General Data Protection Regulations. It requires a basic understanding of web-based systems and networking, level 3 BTEC or higher. You will learn how to assess vulnerabilities to a known IT system and how to reduce those threat vectors.

Taking place over six weeks, each week will contain a mix of taught material, self-study, activities and practical exercises, all carried out online.

Aims and learning outcomes

At the end of this course you will be able to:

Understand the requirement for security governance and the legal aspects of cyber security as it applies to an IT system Identify the type of vulnerabilities and threat vectors to an IT system Suggest the cyber control required to reduce the threat vectors Understand the implication of various strategies used in mitigation of a cyber-attack. Understand the security architecture of an organization Conduct a vulnerability assessment Syllabus ... [-]

Data Security (Non-Technical) - an online course

Southampton Data Science Academy
Online Part time 6 weeks May 2019 United Kingdom Cambridge

This course will teach you how to undertake a cybersecurity risk assessment in your own organization. It is aimed at data scientists including managers, supervisors, and administrators who process personal data as defined in the General Data Protection Regulations. Technical knowledge is not required but the course is centered on a risk-based approach. If you are not able to conduct a security risk assessment at work a case study will be provided for the final assignment. [+]

About this course

This course will teach you how to undertake a cybersecurity risk assessment in your own organization. It is aimed at data scientists including managers, supervisors, and administrators who process personal data as defined in the General Data Protection Regulations. Technical knowledge is not required but the course is centered on a risk-based approach. If you are not able to conduct a security risk assessment at work a case study will be provided for the final assignment.

Taking place over six weeks, each week will contain a mix of taught material, self-study, activities and practical exercises, all carried out online.

Aims and learning outcomes

At the end of this course you will be able to:... [-]