mirror of
https://github.com/ossu/computer-science.git
synced 2024-10-01 01:26:01 -04:00
Update README.md
This commit is contained in:
parent
5a2838dc45
commit
8fabffc04f
18
README.md
18
README.md
@ -393,6 +393,24 @@ Courses | Duration | Effort | Prerequisites
|
|||||||
[Computational Geometry](https://www.edx.org/course/computational-geometry) | 16 weeks | 8 hours/week | algorithms, C++
|
[Computational Geometry](https://www.edx.org/course/computational-geometry) | 16 weeks | 8 hours/week | algorithms, C++
|
||||||
[Game Theory](https://www.coursera.org/learn/game-theory-1) | 8 weeks | 3 hours/week | mathematical thinking, probability, calculus
|
[Game Theory](https://www.coursera.org/learn/game-theory-1) | 8 weeks | 3 hours/week | mathematical thinking, probability, calculus
|
||||||
|
|
||||||
|
### Advanced Information Security
|
||||||
|
|
||||||
|
Courses | Duration | Effort | Prerequisites
|
||||||
|
:-- | :--: | :--: | :--:
|
||||||
|
[Web Security Fundamentals](https://www.edx.org/course/web-security-fundamentals) | 5 weeks | 4-6 hours/week | understanding basic web technologies
|
||||||
|
[Security Governance & Compliance](https://www.coursera.org/learn/security-governance-compliance) | 3 weeks | 3 hours/week | -
|
||||||
|
[Digital Forensics Concepts](https://www.coursera.org/learn/digital-forensics-concepts) | 3 weeks | 2-3 hours/week | Core Security
|
||||||
|
[Secure Software Development: Requirements, Design, and Reuse](https://www.edx.org/course/secure-software-development-requirements-design-and-reuse) | 7 weeks | 1-2 hours/week | Core Programming and Core Security
|
||||||
|
[Secure Software Development: Implementation](https://www.edx.org/course/secure-software-development-implementation) | 7 weeks | 1-2 hours/week | Secure Software Development: Requirements, Design, and Reuse
|
||||||
|
[Secure Software Development: Verification and More Specialized Topics](https://www.edx.org/course/secure-software-development-verification-and-more-specialized-topics) | 7 weeks | 1-2 hours/week | Secure Software Development: Implementation
|
||||||
|
|
||||||
|
Students who want to pursue a professional IT security course and examination can go through Systems Security Certified Practitioner (SSCP) examination.
|
||||||
|
Read More about SSCP examination here: [Systems Security Certified Practitioner](https://www.isc2.org/Certifications/SSCP). The specialization provided below is a collection of paid courses and prepares you for SSCP examination
|
||||||
|
|
||||||
|
Courses | Duration | Effort | Prerequisites
|
||||||
|
:-- | :--: | :--: | :--:
|
||||||
|
[(ISC)² Systems Security Certified Practitioner (SSCP)](https://www.coursera.org/specializations/sscp-training) | 16 weeks | 8-10 hours/week | Core Programming and Core Security
|
||||||
|
|
||||||
### Advanced math
|
### Advanced math
|
||||||
Courses | Duration | Effort | Prerequisites | Discussion
|
Courses | Duration | Effort | Prerequisites | Discussion
|
||||||
:-- | :--: | :--: | :--: | :--:
|
:-- | :--: | :--: | :--: | :--:
|
||||||
|
Loading…
Reference in New Issue
Block a user