Cybersecurity eLearning Courses
Whether it is risk-based security, adaptive cybersecurity or guidelines to creating secure apps. See the current line up of courses.
Secure Software Certificate of Achievement (Continuing Education)
To obtain a Security Certificate of Achievement, candidates are required to successfully complete each of the following course modules to attain certificate.
Short, Cost-Effective Training on Hot Topics Based on the Latest Research and Trends--Constantly Updated! Quartos are peer reviewed, online learning modules that quickly bring you up-to-date on the latest developments in a specific technology.
Cybersecurity Quartos Courses
Large organizations often face difficult tradeoffs in balancing the need to share information with the need to safeguard sensitive data. A prominent way to deal with this tradeoff is on-the-fly screen masking of sensitive data in applications. A proposed hybrid approach for masking Web application screens combines the advantages of the context available at the presentation layer with the flexibility and low overhead of masking at the network layer. This solution can identify sensitive information in the visual context of the application screen and then automatically generate the masking rules to enforce at run time. This approach supports the creation of highly expressive masking rules, while keeping rule authoring easy and intuitive, resulting in an easy to use, effective system.
The ways in which we use and develop tools shape human destiny. This is especially true when such tools are used in harmful ways--as with the recent rash of cyberattacks.
As attack techniques evolve, cybersystems must also evolve to provide the best continuous defense. Leveraging classical denial and deception techniques to understand the specifics of adversary attacks enables an organization to build an active, threat- based cyber defense.
Secure delivery networks can help prevent or mitigate the most common attacks against mission-critical websites. A case study from a leading provider of content delivery services illustrates one such network's operation and effectiveness. The Web extra at https://youtu.be/4FRRI0aJLQM is an overview of the evolving threat landscape with Akamai Director of Web Security Solutions Product Marketing, Dan Shugrue. Dan also shares how Akamai's Kona Site Defender service handles the increasing frequency, volume and sophistication of Web attacks with a unique architecture that is always on and doesn't degrade performance.
Healthcare Security Quartos Courses
Despite the ambiguities of healthcare security costs and benefits, market mechanisms can nudge healthcare organizations toward effective proactive and voluntary security actions. However, the effectiveness of market mechanisms suffers from the economic forces of the imperfect US healthcare market. Thus, market-driven investments must be supplemented with regulator intervention across all types of healthcare organizations. However, such regulatory intervention should focus on reinforcing the economic impact of information security rather than simply trying to force specific behavior.
Managing large, heterogeneous, and rapidly increasing volumes of data, and extracting value out of such data, has long been a challenge. In the past, this was partially mitigated by fast processing technologies that exploited Moore's law.