Filter by
SubjectRequired
LanguageRequired
The language used throughout the course, in both instruction and assessments.
Learning ProductRequired
LevelRequired
DurationRequired
SkillsRequired
SubtitlesRequired
EducatorRequired
Explore the Fraud Course Catalog
- Status: Free Trial
University of London
Skills you'll gain: C++ (Programming Language), Object Oriented Programming (OOP), Debugging, Test Data, Data Validation, Unit Testing, Algorithms, Statistical Programming, Data Structures
- Status: Free Trial
University of California, Irvine
Skills you'll gain: Blockchain, Data Sharing, Cryptography, Transaction Processing, Supply Chain Systems, Distributed Computing, Data Integrity, FinTech, Emerging Technologies, Version Control, Data Validation, Real Estate
- Status: Free Trial
Kennesaw State University
Skills you'll gain: Incident Response, Cybersecurity, Cyber Attacks, Computer Security Incident Management, Security Awareness, Personally Identifiable Information, Cyber Risk, Information Privacy, Safety and Security, Multi-Factor Authentication
Universidad Nacional Autónoma de México
Skills you'll gain: Network Analysis, Ethical Standards And Conduct, Business Ethics, Public Administration, Accountability, Policy Analysis, Law, Regulation, and Compliance, Analysis, Social Sciences, Systems Thinking, Regulation and Legal Compliance, Governance, Social Justice, Legal Proceedings, Political Sciences, Complex Problem Solving, Performance Measurement
- Status: Free Trial
University of Colorado System
Skills you'll gain: Cryptography, Data Integrity, Encryption, Authentications, Data Security, Public Key Cryptography Standards (PKCS), Digital Communications
- Status: Free Trial
Skills you'll gain: Secure Coding, OAuth, Application Security, Authorization (Computing), Authentications, Data Validation, Role-Based Access Control (RBAC), Verification And Validation, Security Controls, User Accounts, Configuration Management, Package and Software Management, Data Loss Prevention, Identity and Access Management, Software Installation, Middleware, Debugging, Dependency Analysis
- Status: Free Trial
SkillUp EdTech
Skills you'll gain: Cryptographic Protocols, Blockchain, Business Continuity, Cryptography, Disaster Recovery, Data Management, Digital Assets, Security Management, Vulnerability Assessments, Regulatory Compliance, Enterprise Security, Data Security, Application Security, Cybersecurity, Emerging Technologies, Distributed Computing
- Status: Free Trial
Kennesaw State University
Skills you'll gain: Email Security, Personally Identifiable Information, Firewall, Threat Detection, Network Security, Cybersecurity, Security Awareness, Cloud Storage, Information Privacy, Cloud Computing, General Networking, Encryption
- Status: Free Trial
Skills you'll gain: Secure Coding, Penetration Testing, Security Testing, Application Security, Cyber Security Assessment, Payment Systems, Security Engineering, Blockchain, Incident Response, Vulnerability Scanning, Code Review, Vulnerability Assessments, Data Security, Authorization (Computing), Data Validation
Skills you'll gain: Anomaly Detection, Image Analysis, Google Cloud Platform, Computer Vision, Data Import/Export, Applied Machine Learning, Quality Assurance, Predictive Modeling
- Status: Free Trial
University of Colorado System
Skills you'll gain: Cryptography, Cybersecurity, Encryption, Key Management, Public Key Cryptography Standards (PKCS), Data Integrity
- Status: Free Trial
Skills you'll gain: Cybersecurity, Cyber Operations, Cyber Threat Hunting, Intrusion Detection and Prevention, Scripting, Python Programming, Authorization (Computing), Command-Line Interface, Operating Systems
Fraud learners also search
In summary, here are 10 of our most popular fraud courses
- Working with Objects in C++: University of London
- The Blockchain System: University of California, Irvine
- Cybersecurity: What to Do When You Are a Victim: Kennesaw State University
- Anticorrupción: Introducción a conceptos y perspectiva práctica: Universidad Nacional Autónoma de México
- Cryptographic Hash and Integrity Protection: University of Colorado System
- Laravel: Configure, Validate, Authenticate and Authorize: Infosec
- Business Implementation and Security: SkillUp EdTech
- Cybersecurity: Protecting your Information at Home: Kennesaw State University
- Security and Auditing in Ethereum: EDUCBA
- Create a Cosmetic Anomaly Detection Model using Visual Inspection AI: Google Cloud