Search result for Computer Security and Networks Online Courses & Certifications
Get Course Alerts by Email
Internet History, Technology, and Security
by Charles Russell Severance- 4.8
Approx. 15 hours to complete
The impact of technology and networks on our lives, culture, and society continues to increase. The very fact that you can take this course from anywhere in the world requires a technological infrastructure that was designed, engineered, and built over the past sixty years. To function in an information-centric world, we need to understand the workings of network technology....
Architecting Smart IoT Devices
by Martin Timmerman , Maarten Weyn- 4.3
Approx. 34 hours to complete
This course will teach you how to develop an embedded systems device. In order to reduce the time to market, many pre-made hardware and software components are available today. You'll discover all the available hardware and software components, such as processor families, operating systems, boards and networks. You'll also learn how to actually use and integrate these components....
How Computers Work
by Dr Marco Gillies- 4.6
Approx. 10 hours to complete
Computers are everywhere, they aren't just the desktops and laptops we use for work but the phones in our pockets and even the watches on our wrists are also computers. You probably use a computer every day and in fact you are reading this on a computer! Abstraction 1. 0. 1....
Managing G Suite
by Google Cloud Training- 4.7
Approx. 8 hours to complete
Managing G Suite is the second course in the G Suite Administration series. This course focuses on the G Suite core services such as Gmail, Calendar, and Drive & Docs. You will become familiar with the various service settings, and learn how to enable them for all or just a subset of your users....
Blockchain, Cryptoassets, and Decentralized Finance
by Don Tapscott , Alex Tapscott- 4.6
Approx. 19 hours to complete
Today, large intermediaries establish trust in our economy and control the movement, storage, and allocation of money and assets. The status quo, however, is rife with inefficiencies. In this course, we’ll address the many challenges of the status quo and discuss how cryptoassets, smart contracts, new identity systems, and new financial business models can help overcome them....
Principles of Secure Coding
by Matthew Bishop, PhD- 4.4
Approx. 16 hours to complete
This course introduces you to the principles of secure programming. It begins by discussing the philosophy and principles of secure programming, and then presenting robust programming and the relationship between it and secure programming. We’ll examine eight design principles that govern secure coding and how to apply them to your own work....
Fundamentals of Network Communication
by Xiaobo Zhou- 4.6
Approx. 15 hours to complete
In this course, we trace the evolution of networks and identify the key concepts and functions that form the basis for layered architecture. We introduce examples of protocols and services that are familiar to the students, and we explain how these services are supported by networks. Communication Networks and Services Welcome...
G Suite Security
by Google Cloud Training- 4.7
Approx. 6 hours to complete
G Suite Security is the third course in the G Suite Administration series. In this course you will focus on the various aspects of G Suite Security including user password policies and how to enable and enforce two step verification (2SV) for your users. You will also become familiar with the SSO options in G Suite....
Software Security
by Michael Hicks- 4.6
Approx. 18 hours to complete
This course we will explore the foundations of software security. We will consider important software vulnerabilities and attacks that exploit them -- such as buffer overflows, SQL injection, and session hijacking -- and we will consider defenses that prevent or mitigate these attacks, including advanced testing and program analysis techniques. OVERVIEW...
G Suite Mail Management
by Google Cloud Training- 4.8
Approx. 6 hours to complete
G Suite Mail Management is the fourth course in the G Suite Administration series. In this course you will learn how to protect your organization against spam, spoofing, phishing and malware attacks. You will configure email compliance and learn how to implement data loss prevention (DLP) for your organization. Learning Objectives...