Security Online Courses for University of Oklahoma Students

Found 38 listings, displaying 1-20
Filter:
Welcome to Cryptography! Cryptography is the practice and study of techniques for securing communications in the presence of third parties. You will learn how to protect information in order to ensure its integrity, confidentiality, authenticity, and non-repudiation. You will come out with a...
Security operations and administration is the task of identifying an organization\'s information assets and the documentation needed for policy implementation, standards, procedures, and guidelines to ensure confidentiality, integrity, and availability. You will understand the process necessary...
Welcome to Systems and Application Security Course! In the Systems and Application Security Course, you will gain an understanding of computer code that can be described as harmful or malicious. Both technical and non-technical attacks will be discussed. You will learn how an organization can...
This is Course 1 in the Introduction to Blockchain course series. Blockchain technology is in a period of exceptional growth, and the accounting profession will play a significant role in driving its adoption. Be part of the blockchain evolution with this course. Starting with a focus on the...
Welcome to Access Controls! The Access Controls Course provides information pertaining to specify what users are permitted to do, the resources they are allowed to access, and what operations they are able to perform on a system. Access Controls help managers limit and monitor systems use at a...
Is your show accessible? When we ask about accessibility to shows, most people think about access for wheel chairs: the sitting arrangements and where their WC is accessible. When we ask for more details, people usually think about producing a show where persons with disabilities are performing,...
The first course in the Sales Operations/Management Specialization, Account Management & Salesforce Design aims to introduce learners to a variety of sales methods. Students will gain knowledge on steps in strategic planning and sales management, responsibilities of a sales manager, kinds of...
*NOTE: You should complete the Accounting Analysis I: The Role of Accounting as an Information System course or be familiar with the concepts taught there before beginning this course* This course is the second course in a five-course Financial Reporting Specialization that covers the collection,...
This course is the definitive introduction to blockchain for both the developer and non-developer audience. Beyond the technology, this course will introduce you to some of the philosophy behind decentralization and why there is so much excitement around it. During the first three modules,...
In this MOOC, you will learn the history of DDoS attacks and analyze new Mirai IoT Malware and perform source code analysis. you will be provided with a brief overview of DDoS Defense techniques. You learn an Autonomous Anti-DDoS Network called A2D2 for small/medium size organizations to deal...
Computer attacks and data breaches are inevitable. It seems like every day a data breach occurs and the victims of the data breach suffer. Their information is stolen or posted online. The company\'s or businesses who had the breach go on, learn a little from the attack, and just give credit...
The world runs on computers. Your watch, your TV, your car. You might be familiar on how to operate each of these. Your home computer you are even more familiar with operating it. But what does it take to really take computer systems to the next level? - The enterprise level. In this course we...
Today organizations are either embracing digital technologies to improve their businesses or being disrupted by entrants with such capabilities. Therefore it is important for managers and executives of all organizations to learn about various technologies and apply them in innovative ways. Some...
Risk Identification, Monitoring, and Analysis: In the Risk Identification, Monitoring, and Analysis session, you will learn how to identify, measure, and control losses associated with adverse events. You will review, analyze, select, and evaluate safeguards for mitigating risk. You will learn...
Creativity is an essential skill for the 21st Century that is innate in all people and can be nurtured. We constantly need new and better ideas for almost every aspect of our professional and personal lives. The goal of this course is to help you recognize, develop and act upon the creativity...
Introduction to Cloud Identity serves as the starting place for any new Cloud Identity, Identity/Access Management/Mobile Device Management admins as they begin their journey of managing and establishing security and access management best practices for their organization. This 15-30 hour...
The world runs computers. From small to large businesses, from the CEO down to level 1 support staff, everyone uses computers. This course is designed to give you a practical perspective on computer security. This course approaches computer security in a way that anyone can understand. Ever...
Whether you are accessing a bank website, Netflix or your home router, chances are that your computer is interacting with a Linux system. The world runs on Linux. In this course, we will dive into how Linux works from an enterprise perspective. In week 1 we will look at what Linux is used for in...
This course opens with an exploration of the social context and aims of literacy teaching and learning. It goes on to describe a range of historical and contemporary approaches to literacy pedagogy, including didactic, authentic, functional, and critical approaches. The course takes has a...
Course Overview: In this course, students will learn the fundamentals of cybersecurity and identify the concepts required to recognize and potentially mitigate attacks against enterprise networks as well as mission critical infrastructure. Course 1 of 5 in the Palo Alto Networks Security...

Security Online Courses for University of Oklahoma Students

Searching for University of Oklahoma Security online courses has never been quicker. Browse Security online courses and more in and around Norman, OK. To help narrow your results down, use Security online course filters to refine your University of Oklahoma Security online course search and enhance your Biology search experience. Sharing relevant Security listings with University of Oklahoma classmates can really help make the search process even faster for them! Uloop.com can help you find University of Oklahoma Security online courses today!

University of Oklahoma Online Courses

Back to Top

Log In

Contact Us

Upload An Image

Please select an image to upload
Note: must be in .png, .gif or .jpg format
OR
Provide URL where image can be downloaded
Note: must be in .png, .gif or .jpg format

By clicking this button,
you agree to the terms of use

By clicking "Create Alert" I agree to the Uloop Terms of Use.

Image not available.

Add a Photo

Please select a photo to upload
Note: must be in .png, .gif or .jpg format