Filter by
SubjectRequired
LanguageRequired
The language used throughout the course, in both instruction and assessments.
Learning ProductRequired
LevelRequired
DurationRequired
SkillsRequired
SubtitlesRequired
EducatorRequired
Results for "smart contract security"
University of Illinois Urbana-Champaign
Skills you'll gain: Digital Marketing, Marketing Communications, Marketing Strategies, Marketing, Digital Communications, Integrated Marketing Communications, Marketing Channel, Promotional Strategies, Search Engine Marketing, Advertising, Social Media Marketing, Media Planning, MarTech, Mobile Banking, Communication, Emerging Technologies, Branding, Consumer Behaviour
University of Virginia
Skills you'll gain: Growth Strategies, Business Strategies, Business Planning, Business Development, Business Marketing, Strategic Marketing, Product Strategy, New Business Development, Entrepreneurship, Business Analysis, Business Process, Business Management, Market Opportunities, Innovation, Prioritization
Akamai Technologies, Inc.
Skills you'll gain: SQL, Linux, Endpoint Security, Database Management, Incident Response, Relational Databases, Network Security, Database Systems, Vulnerability Scanning, Linux Administration, File Systems, Routing Protocols, OSI Models, Application Development, Linux Commands, TCP/IP, General Networking, Scripting, MySQL, Data Structures
- Status: Free
Skills you'll gain: Unified Modeling Language, Systems Development Life Cycle, Embedded Systems, Internet Of Things, Software Development Life Cycle, Application Lifecycle Management, Systems Architecture, Systems Development, Software Architecture, System Design and Implementation, Technical Design, Software Design, Systems Engineering, System Requirements, Prototyping, Requirements Analysis, Real Time Data
Google Cloud
Skills you'll gain: Identity and Access Management, Cloud Security, OAuth, Google Cloud Platform, Kubernetes, Cloud Storage, Security Controls, Application Security, Authorization (Computing), Data Security, Role-Based Access Control (RBAC), Hardening, Vulnerability Scanning, Encryption, Key Management, Virtual Machines
Skills you'll gain: Computer Security Incident Management, Endpoint Security, Incident Management, Incident Response, ISO/IEC 27001, Security Management, Vulnerability Scanning, Risk Management, Personally Identifiable Information, Vulnerability Assessments, Linux, Linux Administration, Infrastructure Security, Network Security, Threat Management, Event Monitoring, Role-Based Access Control (RBAC), Identity and Access Management, Business Risk Management, Security Controls
University of California, Irvine
Skills you'll gain: Blockchain, Cryptography, Encryption, Public Key Infrastructure, Key Management, Transaction Processing, Authentications, FinTech, Emerging Technologies, Payment Systems, Data Integrity, Distributed Computing
University of Pennsylvania
Skills you'll gain: Compliance Training, Compliance Management, Regulatory Compliance, General Data Protection Regulation (GDPR), Law, Regulation, and Compliance, Compliance Auditing, Information Privacy, Governance Risk Management and Compliance, Personally Identifiable Information, Regulatory Requirements, Communication Planning, Risk Management, Internal Communications, Procedure Development, Data Security, Continuous Monitoring, Business Ethics, Governance, Internal Controls, Risk Analysis
University of Colorado System
Skills you'll gain: Data Encryption Standard, Public Key Infrastructure, Cryptography, Public Key Cryptography Standards (PKCS), Key Management, Advanced Encryption Standard (AES), Cryptographic Protocols, Encryption, Data Integrity, Information Systems Security, Cybersecurity, Computer Security, Authentications, Information Assurance, Data Security, Theoretical Computer Science, Algorithms
LearnQuest
Skills you'll gain: Blockchain, Cryptography, Data Storage, Systems Architecture, Network Architecture, Data Architecture, Information Technology Architecture, Distributed Computing, Cybersecurity, Data Security, Other Programming Languages, Emerging Technologies, Scalability, Data Integrity, Transaction Processing, Interoperability
Palo Alto Networks
Skills you'll gain: Cyber Operations, Endpoint Detection and Response, Endpoint Security, Security Information and Event Management (SIEM), Zero Trust Network Access, Cybersecurity, Cyber Threat Intelligence, Threat Modeling, Continuous Monitoring, Security Controls, IT Security Architecture, Threat Detection, Incident Response, Malware Protection, Automation, Authentications, Data Lakes
University of Colorado System
Skills you'll gain: Infrastructure Security, Public Safety and National Security, Cybersecurity, Security Management, Cyber Attacks, Cyber Security Policies, Security Strategy, Threat Modeling, Policty Analysis, Research, and Development, Risk Management Framework
In summary, here are 10 of our most popular smart contract security courses
- Digital Media and Marketing Principles:Â University of Illinois Urbana-Champaign
- Grow to Greatness: Smart Growth for Private Businesses, Part I:Â University of Virginia
- Akamai Network Engineering:Â Akamai Technologies, Inc.
- Introduction to Architecting Smart IoT Devices:Â EIT Digital
- Security Best Practices in Google Cloud:Â Google Cloud
- Tools for Security Specialists:Â Codio
- Cryptography and Hashing Overview:Â University of California, Irvine
- Regulatory Compliance:Â University of Pennsylvania
- Applied Cryptography:Â University of Colorado System
- Fundamentals of Blockchain Architecture:Â LearnQuest