Search result for Computer Security and Networks Online Courses & Certifications
Get Course Alerts by Email
Identifying Security Vulnerabilities
by Sandra Escandor-O'Keefe- 4.6
Approx. 13 hours to complete
This course will help you build a foundation of some of the fundamental concepts in secure programming. We will learn about the concepts of threat modeling and cryptography and you'll be able to start to create threat models, and think critically about the threat models created by other people. Foundational Topics in Secure Programming...
Cryptography
by Jonathan Katz- 4.6
Approx. 18 hours to complete
This course will introduce you to the foundations of modern cryptography, with an eye toward practical applications. Week 1 Course Overview Introduction Introduction Continued Hex and ASCII Breaking the Vigenere Cipher Principles of Modern Cryptography Perfect Secrecy Perfect Secrecy Part II The One-Time Pad Implementing the One-Time Pad Syllabus Programming Assignments...
Planning for your G Suite Deployment
by Google Cloud Training- 4.8
Approx. 5 hours to complete
Planning for your G Suite Deployment is the final course in the G Suite Administration series. In this course, you will be introduced to Google's deployment methodology and best practices. You will take the role of Jon, the Technical Project Lead at Galaxy Sola. Your job is to deploy G Suite to your users with minimal disruption....
Enterprise and Infrastructure Security
by Dr. Edward G. Amoroso- 4.7
Approx. 15 hours to complete
This course introduces a series of advanced and current topics in cyber security, many of which are especially relevant in modern enterprise and infrastructure settings. The basics of enterprise compliance frameworks are provided with introduction to NIST and PCI. Mobile security and cloud security hyper-resilience approaches are also introduced. Security Awareness, Compliance, Assessments, and Risk...
Real-Time Cyber Threat Detection and Mitigation
by Dr. Edward G. Amoroso- 4.7
Approx. 15 hours to complete
This course introduces real-time cyber security techniques and methods in the context of the TCP/IP protocol suites. Explanation of some basic TCP/IP security hacks is used to introduce the need for network security solutions such as stateless and stateful firewalls. Perimeter solutions such as firewalls and intrusion prevention systems are shown to have significant drawbacks in common enterprise environments....
Classical Cryptosystems and Core Concepts
by William Bahn , Richard White , Sang-Yoon Chang- 4.6
Approx. 12 hours to complete
Welcome to Introduction to Applied Cryptography. Cryptography is an essential component of cybersecurity. The need to protect sensitive information and ensure the integrity of industrial control processes has placed a premium on cybersecurity skills in today’s information technology market. Demand for cybersecurity jobs is expected to rise 6 million globally by 2019, with a projected shortfall of 1....
Peer-to-Peer Protocols and Local Area Networks
by Xiaobo Zhou- 4.7
Approx. 16 hours to complete
In this course, we discuss peer-to-peer protocols and local area networks. Part one in this course is to answer the question of how does a peer-to-peer protocol deliver reliable data transfer service across unreliable transmission lines or networks. We focus on several medium access control protocols and their performance analysis. We further discuss local area network and wireless LAN....
Design and Analyze Secure Networked Systems
by Edward Chow- 3.8
Approx. 15 hours to complete
In this MOOC, we will learn the basic cyber security concepts, how to identify vulnerabilities/threat in a network system. We will apply CIA basic security services in the triage of recent cyberattack incidents, such as OPM data breach. We will apply principle of least privileges for controlling the shared access given to different groups of users and system processes....
Exploiting and Securing Vulnerabilities in Java Applications
by Joubin Jabbari- 4.6
Approx. 23 hours to complete
In this course, we will wear many hats. We will also wear Defender Hats. We will dive deep in the code to fix the root cause of these issues and discuss various mitigation strategies. We do this by exploiting WebGoat, an OWASP project designed to teach penetration testing. Finally we fix these issues in WebGoat and build our patched binaries....
Cloud Networking
by P. Brighten Godfrey , Ankit Singla- 4.4
Approx. 23 hours to complete
In the cloud networking course, we will see what the network needs to do to enable cloud computing. We will explore current practice by talking to leading industry experts, as well as looking into interesting new research that might shape the cloud network’s future. Examining how these objectives are met will set the stage for the rest of the course....