Cybersecurity eLearning Courses

Professional Education Resources


Whether it is risk-based security, adaptive cybersecurity or guidelines to creating secure apps. See the current line up of courses.

Secure Software Certificate of Achievement

Secure Software Certificate of Achievement (Continuing Education)

To obtain a Security Certificate of Achievement, candidates are required to successfully complete each of the following course modules to attain certificate.




Short, Cost-Effective Training on Hot Topics Based on the Latest Research and Trends--Constantly Updated! Quartos are peer reviewed, online learning modules that quickly bring you up-to-date on the latest developments in a specific technology.


Cybersecurity Quartos Courses 

Application-Screen Masking A Hybrid Approach

Large organizations often face difficult tradeoffs in balancing the need to share information with the need to safeguard sensitive data. A prominent way to deal with this tradeoff is on-the-fly screen masking of sensitive data in applications. A proposed hybrid approach for masking Web application screens combines the advantages of the context available at the presentation layer with the flexibility and low overhead of masking at the network layer. This solution can identify sensitive information in the visual context of the application screen and then automatically generate the masking rules to enforce at run time. This approach supports the creation of highly expressive masking rules, while keeping rule authoring easy and intuitive, resulting in an easy to use, effective system.

Cyberhuman Security

The ways in which we use and develop tools shape human destiny. This is especially true when such tools are used in harmful ways--as with the recent rash of cyberattacks.

Denial and Deception in Cyber Defense

As attack techniques evolve, cybersystems must also evolve to provide the best continuous defense. Leveraging classical denial and deception techniques to understand the specifics of adversary attacks enables an organization to build an active, threat- based cyber defense.

Protecting Websites from Attack with Secure Delivery Networks

Secure delivery networks can help prevent or mitigate the most common attacks against mission-critical websites. A case study from a leading provider of content delivery services illustrates one such network's operation and effectiveness. The Web extra at is an overview of the evolving threat landscape with Akamai Director of Web Security Solutions Product Marketing, Dan Shugrue. Dan also shares how Akamai's Kona Site Defender service handles the increasing frequency, volume and sophistication of Web attacks with a unique architecture that is always on and doesn't degrade performance.

Healthcare Security Quartos Courses 

Protecting Patient Data-The Economic Perspective of Healthcare Security

Despite the ambiguities of healthcare security costs and benefits, market mechanisms can nudge healthcare organizations toward effective proactive and voluntary security actions. However, the effectiveness of market mechanisms suffers from the economic forces of the imperfect US healthcare market. Thus, market-driven investments must be supplemented with regulator intervention across all types of healthcare organizations. However, such regulatory intervention should focus on reinforcing the economic impact of information security rather than simply trying to force specific behavior.

Trustworthy Processing of Healthcare Big Data in Hybrid Clouds

Managing large, heterogeneous, and rapidly increasing volumes of data, and extracting value out of such data, has long been a challenge. In the past, this was partially mitigated by fast processing technologies that exploited Moore's law.

Risk-Based Security Quartos Courses 

A Cloud Security Risk-Management Strategy

Given the threat of security breaches, to both cloud service providers and organizational cloud service users, cloud security and privacy are growing public policy concerns as well a salient area of inquiry for researchers. To ensure organizational competitiveness, cloud service providers and organizational cloud service users must make detailed preparations to act against cyberthreats before they occur, and to recover from malicious cyberactivities when such threats succeed. A cloud security risk-management strategy should be a dynamic document that's regularly reviewed by stakeholders, and should include policies and objectives that align with the organization's needs.

Cybersecurity Standards - Managing Risk and Creating Resiliences

A risk-based cybersecurity framework must continuously assimilate new information and track changing stakeholder priorities and adversarial capabilities, using decision-analysis tools to link technical data with expert judgment.

Decision Support Software for Probabilistic Risk Assessment Using Bayesian Networks

Norman Fenton and Martin Neil explain the world of Bayesian decision networks and the development of the company Agena, which developed its own Bayesian network platform.

Vidal-Hall and Risk Management for Privacy Breaches

The recent English Court of Appeal case of Google v. Vidal-Hall raises three issues for many Internet-based businesses: whether they can be sued in tort for misuse of private information, whether browser-generated information is defined as personal data, and whether compensation for emotional distress without accompanying financial loss can be awarded.

Computing Now