Filtrer par
ObjetObligatoire
LangueObligatoire
La langue utilisée tout au long du cours, tant dans l’enseignement que dans les évaluations.
Produit d'apprentissageObligatoire
NiveauObligatoire
DuréeObligatoire
Sous-titresObligatoire
ÉducateurObligatoire
Explorez le catalogue de cours en technologies de l'information
Statut : PrévisualisationCompétences que vous acquerrez: Computer Hardware, Hardware Architecture, Data Storage Technologies, System Configuration, Microarchitecture, Computer Architecture, Software Installation, Peripheral Devices
Statut : Essai gratuitUniversity of California, Irvine
Compétences que vous acquerrez: Conception et mise en œuvre du système, Technologies de l'information, Maîtrise de l'informatique, Sécurité des données, Éthique des données, Outils de développement de logiciels, Sûreté et sécurité, Protection de l'information, Stratégies technologiques, Partage des données, Cybersécurité
Statut : PrévisualisationJohns Hopkins University
Compétences que vous acquerrez: Computer Systems, Informatics, Data Processing, Data Sharing, Computing Platforms, Health Informatics, Bioinformatics, Data Storage, Computer Architecture, Computer Literacy, Computer Hardware, Big Data, Capacity Management, Data Centers, Cloud Computing
Statut : PrévisualisationNortheastern University
Compétences que vous acquerrez: Scope Management, Requirements Management, Project Scoping, Project Documentation, Change Control, Project Planning, Agile Methodology, Strategic Planning, Project Management Life Cycle, Project Management, Business Planning, Systems Thinking, Risk Management, Stakeholder Communications
Statut : PrévisualisationIllinois Tech
Compétences que vous acquerrez: Cybersecurity, Cyber Attacks, Network Security, Information Systems Security, Computer Security, Cryptography, Disaster Recovery, Application Security, Cyber Operations, Cyber Security Policies, Cryptographic Protocols, IT Security Architecture, Telecommunications, Network Administration, NIST 800-53, Infrastructure Security, Security Controls, Data Security, Encryption, Governance Risk Management and Compliance
Statut : PrévisualisationUniversity of Colorado Boulder
Compétences que vous acquerrez: Internet Of Things, Network Protocols, Computer Networking, Wireless Networks, Information Systems Security, Cybersecurity, Real-Time Operating Systems, Data Security, Emerging Technologies, Software-Defined Networking, Cloud Platforms, Encryption
Statut : Essai gratuitCompétences que vous acquerrez: Data Loss Prevention, Security Testing, Network Security, Cryptography, Security Controls, Cloud Security, Encryption, Data Security, Information Assurance, Cybersecurity, Identity and Access Management, Penetration Testing, Cloud Computing, Cyber Risk, Vulnerability Scanning, Authorization (Computing), Computer Security Incident Management, Information Privacy
Statut : Essai gratuitCompétences que vous acquerrez: Assistance bureautique, Support technique, Communication technique, Niveau de service, Formation et assistance aux utilisateurs finaux, Gestion des services informatiques, Soutien au système, Systèmes d'accès à distance, Service client, Documentation technique, Employé(e) du centre d’assistance, Suivi des questions
Statut : Essai gratuitCompétences que vous acquerrez: Network Security, Network Troubleshooting, Software-Defined Networking, Network Monitoring, Threat Modeling, TCP/IP, Network Architecture, Computer Networking, Network Protocols, General Networking, Cybersecurity, Network Infrastructure, Local Area Networks, Network Analysis, OSI Models, Network Routing, Networking Hardware, Network Switches
Statut : NouveauStatut : PrévisualisationO.P. Jindal Global University
Compétences que vous acquerrez: Emerging Technologies, Technology Strategies, Cybersecurity, Digital Transformation, Internet Of Things, Cloud Computing, Business Transformation, Digital Marketing, Business Strategy, Blockchain, Artificial Intelligence, Real Time Data, E-Commerce
Statut : PrévisualisationUniversidades Anáhuac
Compétences que vous acquerrez: Malware Protection, Information Systems Security, Cybersecurity, Cyber Attacks, Data Security, Security Awareness, Network Security, Information Assurance, Threat Modeling, Security Controls, Human Factors (Security), Vulnerability Assessments
Statut : PrévisualisationCompétences que vous acquerrez: Virtualization, Cloud Computing, Virtual Machines, Cloud Services, Computer Hardware, Mobile Security, Operating Systems, Computer Displays, Containerization, Wireless Networks, Android (Operating System), Apple iOS
En résumé, voici 10 de nos cours les plus populaires sur information technology .
- Introduction to Contemporary Operating Systems and Hardware 1a: Illinois Tech
- Données, sécurité et vie privée: University of California, Irvine
- Computing for Cancer Informatics: Johns Hopkins University
- Strategic Info Systems: Planning & Business Alignment: Northeastern University
- Cyber Security Technologies: Illinois Tech
- 산업용 IoT 시장 및 보안: University of Colorado Boulder
- Protection of Information Assets: Packt
- Introduction à l'assistance technique : IBM
- Introduction to Data Networks and the Internet - Master's: Illinois Tech
- Emerging Technologies & Digital Business: O.P. Jindal Global University










