Search result for Computer Security and Networks Online Courses & Certifications
Get Course Alerts by Email
Secure Networked System with Firewall and IDS
by Edward Chow- 3.8
Approx. 9 hours to complete
In this MOOC, we will focus on learning how network systems are secured using firewalls and IDS. This will include understanding the basic components of network security, constructing a dual-firewall DMZ, and defining security policies to implement and enforce these rules. Building upon these lessons we will go in-depth on the popular Linux firewall....
Web Connectivity and Security in Embedded Systems
by Juha Plosila , Farhoud Hosseinpour- 4.4
Approx. 12 hours to complete
Welcome to Web Connectivity and Security in Cyber Physical Systems! In this course, we will explore several technologies that bring modern devices together, facilitating a network of connected things and making devices internet enabled. We will discuss rules, protocols, and standards for these devices to communicate with each other in the network....
DDoS Attacks and Defenses
by Edward Chow- 4.5
Approx. 15 hours to complete
In this MOOC, you will learn the history of DDoS attacks and analyze new Mirai IoT Malware and perform source code analysis. you will be provided with a brief overview of DDoS Defense techniques. You learn an Autonomous Anti-DDoS Network called A2D2 for small/medium size organizations to deal with DDoS attacks....
Advanced System Security Topics
by Edward Chow , Greg Williams- 4.5
Approx. 15 hours to complete
In this MOOC, we learn RBAC and ABAC access control to facilitate the specification and management of access policies. We learn examples of how RBAC is supported by modern systems such as Docker and AWS IAM. We learn XACML 3. We show how Google Map and Web Crytpo Enhance Security with Geolocation...
Security and Privacy in TOR Network
by Edward Chow , Greg Williams , Richard White- 4.3
Approx. 22 hours to complete
In this MOOC, we will learn about TOR basic concept and see how they protect the security and privacy of users and resist censorship. We will examine how TOR realize the anonymity and utilize its service by downloading and using Tor browser software. A recent attack on TOR’s application flow control called sniper attacks is analyzed....
Basic Cryptography and Programming with Crypto API
by Edward Chow- 4.3
Approx. 16 hours to complete
In this MOOC, we will learn the basic concepts and principles of crytography, apply basic cryptoanalysis to decrypt messages encrypted with mono-alphabetic substitution cipher, and discuss the strongest encryption technique of the one-time-pad and related quantum key distribution systems. Basic Cryptography Course Overview Basic Cryptography Kerckhoff's Principle CryptoAnalysis of Monoalphabetic Substitution Cipher...
The Business of Cybersecurity Capstone
by Dr. Humayun Zafar, CEH, CISM, CRISC, PCIP , Dr. Traci Carte , Herbert J. Mattord, Ph.D., CISM, CISSP, CDP , Andy Green, Ph.D. , Michael Whitman, Ph.D., CISM, CISSP- 4.9
Approx. 17 hours to complete
This course intends to make the student familiar with information security management. When you have finished with this course you will know more about: • Governance: including the mission, roles and responsibilities of the InfoSec governance function, and the strategic planning process and InfoSec’s role in the organization’s strategic planning effort....
Cloud Computing Project
by Indranil Gupta , Roy H. Campbell , P. Brighten Godfrey , Ankit Singla- 4.1
Approx. 21 hours to complete
Note: You should complete all the other courses in this Specialization before beginning this course. Orientation Welcome to the Cloud Computing Project! Orientation Overview Syllabus Project Overview About the Discussion Forums Updating Your Profile Week 1 - Task Overview Task 1 Overview Task 1 Rubric Task 1 Queries Week 2 Week 2 Overview...
Check Point Jump Start: SMB Network Security
by Check Point Software Technologies- 0.0
Approx. 2 hours to complete
This course introduces you to Check Point's Small and Medium Business (SMB) network security appliances. You will learn how to deploy, configure, manage, and monitor network security policy on the SMB appliance platform. Upon completion of this course, you will be prepared to deploy, configure, and administrate a Check Point Small/Medium Business Network Security appliance....
Cryptography I
by Dan Boneh- 4.8
Approx. 23 hours to complete
Cryptography is an indispensable tool for protecting information in computer systems. In this course you will learn the inner workings of cryptographic systems and how to correctly use them in real-world applications. We will examine many deployed protocols and analyze mistakes in existing systems. Course overview and stream ciphers Course Overview...