TrueschoTruescho
Online courses from top universities

Online Courses Catalog

Explore thousands of online courses from MIT, Harvard, Princeton and more — free and paid, self-paced or instructor-led.

22,703 courses available

Level:
Mode:

22,703 results — page 459 of 946

Edge Computing Fundamentals
Coursera
Unknown

Edge Computing Fundamentals

LearnQuest

Introduction to edge computing architecture, devices, networks, and security challenges for IoT developers, cybersecurity professionals, and IT leaders.

Unknown
Details
Strategic Edge Security Management
Coursera
Unknown

Strategic Edge Security Management

LearnQuest

This course addresses strategic edge security for IT leaders, cybersecurity professionals, and cloud service providers to manage risks and responses effectively.

Unknown
Details
Implementing Security in IoT and Edge Devices
Coursera
Unknown

Implementing Security in IoT and Edge Devices

LearnQuest

This course teaches IoT developers and cybersecurity professionals how to secure IoT and edge devices by understanding vulnerabilities and applying protective measures.

Unknown
Details
Secure AI Systems Across Lifecycle Stages
Coursera
Unknown

Secure AI Systems Across Lifecycle Stages

Coursera

Explore complex AI security threats and defenses throughout the AI/ML lifecycle with practical labs and threat modeling using industry frameworks.

Unknown
Details
Security & Ethical Hacking: Attacking Web and AI Systems
Coursera
Unknown

Security & Ethical Hacking: Attacking Web and AI Systems

University of Colorado Boulder

Learn how web-based software security and AI agents can be compromised through real-world attacks on various web technologies and frameworks.

Unknown
Details
Security and Authentication
Coursera
Unknown

Security and Authentication

Microsoft

This course covers security and authentication in back-end development, focusing on ASP.NET Identity, role-based access control, and data protection principles.

Unknown
Details
Security and Auditing in Ethereum
Coursera
Unknown

Security and Auditing in Ethereum

EDUCBA

Gain advanced understanding of Ethereum DApps security risks, vulnerabilities, and auditing methods to protect smart contracts effectively.

Unknown
Details
Security Administration with Cisco Defense Orchestrator
Coursera
Unknown

Security Administration with Cisco Defense Orchestrator

LearnQuest

Beginner-level course introducing IT security fundamentals alongside Cisco's security technologies for career changers.

Unknown
Details
Advanced Applications of CDO in Enterprise Security Admin
Coursera
Unknown

Advanced Applications of CDO in Enterprise Security Admin

LearnQuest

Advanced course for IT Security professionals focusing on strategic CDO deployment, integration, and troubleshooting in enterprise environments.

Unknown
Details
Mastering Security Management with CDO
Coursera
Unknown

Mastering Security Management with CDO

LearnQuest

This intermediate course focuses on managing security policies across Cisco solutions using Cisco Defense Orchestrator (CDO) for IT Security professionals.

Unknown
Details
Networking and Security in iOS Applications
Coursera
Unknown

Networking and Security in iOS Applications

University of California, Irvine

Learn to build iOS apps that securely interact with web services, receive push notifications, and store data safely on devices using Core Data.

Unknown
Details
Securing Services: Hashicorp Consul & Vault Mastery
Coursera
Unknown

Securing Services: Hashicorp Consul & Vault Mastery

Coursera

Master secure service communication, discovery, and secret management in cloud-native microservices using Hashicorp Consul and Vault.

Unknown
Details
Securing Applications with Checkmarx
Coursera
Unknown

Securing Applications with Checkmarx

Coursera

Learn to integrate dynamic application security testing (DAST) using Checkmarx and ZAP into development pipelines and analyze vulnerability results effectively.

Unknown
Details
Securing and Monitoring AWS Infrastructure
Coursera
Unknown

Securing and Monitoring AWS Infrastructure

Edureka

Comprehensive hands-on course covering AWS networking, security management, monitoring tools, and cost optimization for secure and scalable cloud environments.

Unknown
Details
Securing AI Systems
Coursera
Unknown

Securing AI Systems

Edureka

Hands-on course to secure machine learning applications against threats like adversarial attacks, focusing on defense strategies, monitoring, and governance frameworks.

Unknown
Details
Securing AI Data and Applications
Coursera
Unknown

Securing AI Data and Applications

Coursera

Secure AI data and applications using zero-trust models, governance frameworks, and compliance standards to protect against evolving threats and ensure regulatory readiness.

Unknown
Details
Securing AI and Advanced Topics
Coursera
Unknown

Securing AI and Advanced Topics

Johns Hopkins University

Explore advanced techniques to secure AI systems against emerging threats, focusing on fraud detection and adversarial attacks using cloud AI solutions.

Unknown
Details
Secure Your Workspace Collaboration & Governance
Coursera
Unknown

Secure Your Workspace Collaboration & Governance

Coursera

A beginner course helping project managers secure digital workspaces using essential security setups like two-factor authentication and access controls for project data protection.

Unknown
Details
Secure Your Data at Rest
Coursera
Unknown

Secure Your Data at Rest

Microsoft

Learn to secure data at rest on Azure using encryption, monitoring, and advanced tools like Defender to protect databases and maintain data integrity.

Unknown
Details
Secure Your Cloud Data with Azure
Coursera
Unknown

Secure Your Cloud Data with Azure

Microsoft

Learn to leverage built-in Azure services to securely store app data, ensuring access is limited to authorized services and clients, focusing on cloud security and access management.

Unknown
Details
Secure Your Applications
Coursera
Unknown

Secure Your Applications

Microsoft

Learn to secure cryptographic keys and secrets in cloud applications using Azure security tools and defense in depth strategies.

Unknown
Details
Secure Your AI: Threat Modeling
Coursera
Unknown

Secure Your AI: Threat Modeling

Coursera

An intermediate course guiding architects and engineers to secure complex AI systems by integrating threat modeling and resilience into design and secret management.

Unknown
Details
Secure VPC Networks with Cloud Next Generation Firewall
Coursera
Unknown

Secure VPC Networks with Cloud Next Generation Firewall

Google Cloud

Training focused on securing VPC infrastructure using Cloud Next Generation Firewall with policy implementation and intrusion detection.

Unknown
Details
Secure VPC Networks with Cloud Next Generation Firewall
Coursera
Unknown

Secure VPC Networks with Cloud Next Generation Firewall

Google Cloud

This training shows how to secure VPC infrastructure using Cloud Next Generation Firewall by implementing policies and intrusion detection and prevention.

Unknown
Details