Intermediate
65 Lessons
9h
Certificate of Completion
AI-POWERED
AI-POWERED
This course includes
This course includes
Course Overview
It seems like hardly a week goes by without a high-profile computer breach. Why do these happen? How can you prevent them? This course doesn’t have all the answers, but it does outline practices that make life harder for attackers and that will help tide you over until you get a full-time security team in place. In this course, you will learn 5 simple, yet effective, techniques for preventing attackers from getting into your system. These techniques are related to: patching, software vulnerabilities, crypt...
Course Content
Introduction
Patching
Vulnerabilities
Cryptography
Windows
Phishing
8 Lessons
Course Author
Trusted by 1.4 million developers working at companies
Anthony Walker
@_webarchitect_
Emma Bostian 🐞
@EmmaBostian
Evan Dunbar
ML Engineer
Carlos Matias La Borde
Software Developer
Souvik Kundu
Front-end Developer
Vinay Krishnaiah
Software Developer
Eric Downs
Musician/Entrepeneur
Kenan Eyvazov
DevOps Engineer
Anthony Walker
@_webarchitect_
Emma Bostian 🐞
@EmmaBostian
See how Educative uses AI to make your learning more immersive than ever before.
Instant Code Feedback
AI-Powered Mock Interviews
Adaptive Learning
Explain with AI
AI Code Mentor