Search result for Computer Security and Networks Online Courses & Certifications
Get Course Alerts by Email
Principles of Secure Coding
by Matthew Bishop, PhD- 4.4
Approx. 16 hours to complete
This course introduces you to the principles of secure programming. It begins by discussing the philosophy and principles of secure programming, and then presenting robust programming and the relationship between it and secure programming. We’ll examine eight design principles that govern secure coding and how to apply them to your own work....
Fundamentals of Network Communication
by Xiaobo Zhou- 4.6
Approx. 15 hours to complete
In this course, we trace the evolution of networks and identify the key concepts and functions that form the basis for layered architecture. We introduce examples of protocols and services that are familiar to the students, and we explain how these services are supported by networks. Communication Networks and Services Welcome...
G Suite Security
by Google Cloud Training- 4.7
Approx. 6 hours to complete
G Suite Security is the third course in the G Suite Administration series. In this course you will focus on the various aspects of G Suite Security including user password policies and how to enable and enforce two step verification (2SV) for your users. You will also become familiar with the SSO options in G Suite....
Software Security
by Michael Hicks- 4.6
Approx. 18 hours to complete
This course we will explore the foundations of software security. We will consider important software vulnerabilities and attacks that exploit them -- such as buffer overflows, SQL injection, and session hijacking -- and we will consider defenses that prevent or mitigate these attacks, including advanced testing and program analysis techniques. OVERVIEW...
G Suite Mail Management
by Google Cloud Training- 4.8
Approx. 6 hours to complete
G Suite Mail Management is the fourth course in the G Suite Administration series. In this course you will learn how to protect your organization against spam, spoofing, phishing and malware attacks. You will configure email compliance and learn how to implement data loss prevention (DLP) for your organization. Learning Objectives...
Blockchain Transformations of Financial Services
by Don Tapscott , Alex Tapscott- 4.7
Approx. 16 hours to complete
The current global financial system is riddled with inefficiencies, uneven developments, and bizarre contradictions. Blockchain technology has the potential to bring about profound changes to financial services. In this course, you will learn how blockchain technology will disrupt the core functions of the financial services industry, offering individuals and organizations alike real choices in how they create and manage value....
Cyber Attack Countermeasures
by Dr. Edward G. Amoroso- 4.8
Approx. 19 hours to complete
This course introduces the basics of cyber defense starting with foundational models such as Bell-LaPadula and information flow frameworks. These underlying policy enforcements mechanisms help introduce basic functional protections, starting with authentication methods. Learners will be introduced to a series of different authentication solutions and protocols, including RSA SecureID and Kerberos, in the context of a canonical schema....
Securing Digital Democracy
by J. Alex Halderman- 4.8
Approx. 14 hours to complete
In this course, you'll learn what every citizen should know about the security risks--and future potential — of electronic voting and Internet voting. We'll take a look at the past, present, and future of election technologies and explore the various spaces intersected by voting, including computer security, human factors, public policy, and more....
Blockchain Scalability and its Foundations in Distributed Systems
by Vincent Gramoli- 4.7
Approx. 11 hours to complete
Blockchain promises to disrupt industries once it will be efficient at large scale. In this course, you will learn how to make blockchain scale. You will learn about the foundational problem of distributed computing, consensus, that is key to create blocks securely. In particular, this course will help you: * understand security vulnerabilities of mainstream blockchains;...
Software Defined Networking
by Dr. Nick Feamster- 4.6
Approx. 32 hours to complete
In this course, you will learn about software defined networking and how it is changing the way communications networks are managed, maintained, and secured. Week One Introduction to SDN (Summer 2015): What's New Overview Part 1 Overview Part 2 Central Control Active Networks Network Virtualization From FORCES to Ethane: Control Plane Evolution...