Students who have existing computer and programming knowledge can learn a lot in this comprehensive course about information security. It features bot..
The impact of technology and networks on our lives, culture, and society continues to increase. The very fact that you can take this course from anywh..
ASP.NET Security Secrets Revealed is all about looking at a broad range of security features within the framework in small bites of easily consumable ..
Information security is an increasingly critical part of life, yet it can be a struggle to keep the hackers at bay. This course tackles some common mi..
Enterprises around the world are concerned about cyber security. This course will teach you the fundamentals of information security applicable in any..
Informational security is a very serious topic for any company. This course will explore the informational security through some introductory material..
Learn key principles of risk analysis, risk assessment and risk mitigation for information security using both qualitative and quantitative methodolog..
Move your digital information away from Big Services that snoop your stuff! In this course, Rob Conery will show you how to set up your own domain: em..
Look at digital technology and innovation from the perspective of a chief information officer (CIO). Learn about Agile frameworks, cybersecurity and r..
Social engineering is a powerful technique attackers can use to coerce human targets into exposing sensitive information. In this course, Troy Hunt an..
Chief Information Security Officer (CISO) has a great role to play as far cybersecurity is concerned. Whether he acts fr the governemnt, an organizati..
The Payment Card Industry (PCI) Data Security Standard (DSS) affects every organization that stores, processes, or transmits credit or debit cards. In..
Implementing ISO 27001 can be a daunting task. In this course, you'll learn what's involved in the certification process, the major phases of initial ..
User account and access management is a foundational concept that is critical to an organization's overall information security health. This course te..
Today cyber-crime is forcing organizations to pay more attention to information security. You'll learn that Vulnerability Management Programs helps de..
Welcome to Introduction to Applied Cryptography. Cryptography is an essential component of cybersecurity. The need to protect sensitive information an..
No. As a matter of fact, sometimes you will even be provided a discount on courses because you are a referral of us.
What do I get when I buy a course?
+
This really depends on which course you buy and at which platform. We try to provide as much detailed information on the courses such as their price, the quality of the certificate, the level of difficulty, and what you will get, but you should always take a good look at the course page on the original platform to check this.
What is Courseroot really?
+
Courseroot is a platform to aims to help people find the right course for whatever it is they want to achieve. Whether you are looking for a programming tutorial to just developer your expertise or for an extensive ux design course with a high-quality certificate for your cv, we will help you find it.
What is the 50% rule?
+
The internet has made access to educational resources much and much better. With a smartphone or a laptop, you now get to study anything you want and develop your skills. However, for many children and adults in this world, this access has not been provided yet, or they do not get the chance to even consider studying because they are lacking basic needs such as proper nutrition and drinking water. Our mission with the 50% rule is to distribute some of this opportunity to these people by taking half of our profits and donating it to a charitable cause that has set out to help these less fortunate people and allow them to dream of a brighter future.
What characteristics can I use to filter through courses?
+
You can use pretty much any course characteristic to filter on such as price, level of difficulty, certificate quality, hours of content, and course provider.