Security Online Courses for NU Students

Found 18 listings, displaying 1-18
Filter:
Course Overview: In this course, students will learn the fundamentals of cybersecurity and identify the concepts required to recognize and potentially mitigate attacks against enterprise networks as well as mission critical infrastructure. Course 1 of 5 in the Palo Alto Networks Security...
Cybersecurity Gateway II Gateway II Course Description Gateway II provides the student with a full understanding of the fundamental tenants of networking and covers the general concepts involved in maintaining a secure network computing environment. Upon successful completion of this course,...
PaloAlto Networks Gateway 1 Gateway 1 Course Description: Gateway Part I provides the student with a partial understanding of the fundamental tenants of networking and covers the general concepts involved in maintaining a secure network computing environment. Upon successful completion of this...
Palo Alto Networks Cybersecurity Essentials II Course Description: Essentials II provides the student with a full understanding of the fundamental tenants of cybersecurity and covers the general security concepts involved in maintaining a secure network computing environment. Students will fully...
Palo Alto Networks Cybersecurity Essentials I Course Description: Essentials I provides the student with a partial understanding of the fundamental tenants of cybersecurity and covers the general security concepts involved in maintaining a secure network computing environment. Students will...
The Palo Alto Networks Cybersecurity Specialization prepares students for entry level careers in cybersecurity, with an emphasis on administering the Palo Alto Networks Next Generation Firewall. All courses also map learning objectives to the U.S. NIST/NICE framework and cybersecurity work...
The world runs on computers. Your watch, your TV, your car. You might be familiar on how to operate each of these. Your home computer you are even more familiar with operating it. But what does it take to really take computer systems to the next level? - The enterprise level. In this course we...
Whether you are accessing a bank website, Netflix or your home router, chances are that your computer is interacting with a Linux system. The world runs on Linux. In this course, we will dive into how Linux works from an enterprise perspective. In week 1 we will look at what Linux is used for in...
Microsoft Windows has been at the forefront of enterprise computing for several decades. What most office workers see is the desktop side - such as Windows 7, 8 or 10. This course explores what it takes to design and build the server side of Windows in an enterprise environment. This course will...
It seems anymore that you can\'t listen to the news without hearing of a data breach. You may have heard it said before that there are 2 types of companies out there, the ones who have been breached and those who will be breached. Defending against attackers who want to compromise assets can seem...
Computer attacks and data breaches are inevitable. It seems like every day a data breach occurs and the victims of the data breach suffer. Their information is stolen or posted online. The company\'s or businesses who had the breach go on, learn a little from the attack, and just give credit...
The world runs computers. From small to large businesses, from the CEO down to level 1 support staff, everyone uses computers. This course is designed to give you a practical perspective on computer security. This course approaches computer security in a way that anyone can understand. Ever...
I\'ve heard this before - \"I\'m not sure my computer security practices are working\". I reply \"Have you tested them?\" This course is the fourth and final course in the Practical Computer Security specialization. In this course, you\'ll learn how to proactively test what you have put in place...
Welcome to Access Controls! The Access Controls Course provides information pertaining to specify what users are permitted to do, the resources they are allowed to access, and what operations they are able to perform on a system. Access Controls help managers limit and monitor systems use at a...
Risk Identification, Monitoring, and Analysis: In the Risk Identification, Monitoring, and Analysis session, you will learn how to identify, measure, and control losses associated with adverse events. You will review, analyze, select, and evaluate safeguards for mitigating risk. You will learn...
Welcome to Networks and Communications Security Course! In the Networks and Communications Security Course, you will learn about the network structure, data transmission methods, transport formats, and the security measures used to maintain integrity, availability, authentication, and...
Security operations and administration is the task of identifying an organization\'s information assets and the documentation needed for policy implementation, standards, procedures, and guidelines to ensure confidentiality, integrity, and availability. You will understand the process necessary...
Welcome to Systems and Application Security Course! In the Systems and Application Security Course, you will gain an understanding of computer code that can be described as harmful or malicious. Both technical and non-technical attacks will be discussed. You will learn how an organization can...

Security Online Courses for NU Students

Searching for NU Security online courses has never been quicker. Browse Security online courses and more in and around Boston, MA. To help narrow your results down, use Security online course filters to refine your NU Security online course search and enhance your Biology search experience. Sharing relevant Security listings with Northeastern University classmates can really help make the search process even faster for them! Uloop.com can help you find NU Security online courses today!

NU Online Courses

Back to Top

Log In

Contact Us

Upload An Image

Please select an image to upload
Note: must be in .png, .gif or .jpg format
OR
Provide URL where image can be downloaded
Note: must be in .png, .gif or .jpg format

By clicking this button,
you agree to the terms of use

By clicking "Create Alert" I agree to the Uloop Terms of Use.

Image not available.

Add a Photo

Please select a photo to upload
Note: must be in .png, .gif or .jpg format