Search result for Computer Security and Networks Online Courses & Certifications
Get Course Alerts by Email
Mathematical Foundations for Cryptography
by William Bahn , Richard White , Sang-Yoon Chang- 4.6
Approx. 14 hours to complete
Welcome to Course 2 of Introduction to Applied Cryptography. In this course, you will be introduced to basic mathematical principles and functions that form the foundation for cryptographic and cryptanalysis methods. These principles and functions will be helpful in understanding symmetric and asymmetric cryptographic methods examined in Course 3 and Course 4....
Cloud Computing Applications, Part 1: Cloud Systems and Infrastructure
by Roy H. Campbell , Reza Farivar- 4.2
Approx. 15 hours to complete
Welcome to the Cloud Computing Applications course, the first part of a two-course series designed to give you a comprehensive view on the world of Cloud Computing and Big Data! In this first course we cover a multitude of technologies that comprise the modern concept of cloud computing. Course Orientation Welcome to Cloud Computing Applications Part 1...
TCP/IP and Advanced Topics
by Xiaobo Zhou- 4.7
Approx. 16 hours to complete
In this course, we give an in-depth study of the TCP/IP protocols. We examine the details of how IP enables communications across a collection of networks. We pay particular attention to the hierarchical structure of IP addresses and explain their role in ensuring scalability of the Internet. We review in details about TCP three-way handshake, flow control, and congestion control....
Cloud Computing Applications, Part 2: Big Data and Applications in the Cloud
by Reza Farivar , Roy H. Campbell- 4.3
Approx. 20 hours to complete
Welcome to the Cloud Computing Applications course, the second part of a two-course series designed to give you a comprehensive view on the world of Cloud Computing and Big Data! Cloud applications and data analytics represent a disruptive change in the ways that society is informed by, and uses information. Next we present NOSQL Databases....
Symmetric Cryptography
by Sang-Yoon Chang- 4.6
Approx. 13 hours to complete
Welcome to Symmetric Cryptography! Symmetric cryptography relies on shared secret key to ensure message confidentiality, so that the unauthorized attackers cannot retrieve the message. The course describes substitution and transposition techniques, which were the bases for classical cryptography when the message is encoded in natural language such as English. Classical Cipher: Substitution...
Asymmetric Cryptography and Key Management
by Sang-Yoon Chang- 4.7
Approx. 9 hours to complete
Welcome to Asymmetric Cryptography and Key Management! In asymmetric cryptography or public-key cryptography, the sender and the receiver use a pair of public-private keys, as opposed to the same symmetric key, and therefore their cryptographic operations are asymmetric. This course also describes some mathematical concepts, e. g. Asymmetric Cryptography Overview Instructor Introduction...
Identifying Security Vulnerabilities in C/C++Programming
by Matthew Bishop, PhD- 4.6
Approx. 23 hours to complete
This course builds upon the skills and coding practices learned in both Principles of Secure Coding and Identifying Security Vulnerabilities, courses one and two, in this specialization. This course uses the focusing technique that asks you to think about: “what to watch out for” and “where to look” to evaluate and ultimately remediate fragile C++ library code....
Cryptography and Information Theory
by Sang-Yoon Chang- 4.5
Approx. 8 hours to complete
Welcome to Cryptography and Information Theory! This course combines cryptography (the techniques for protecting information from unauthorized access) and information theory (the study of information coding and transfer). More specifically, the course studies cryptography from the information-theoretical perspectives and discuss the concepts such as entropy and the attacker knowledge capabilities, e....
Cyber Incident Response
by Keatron Evans- 4.5
Approx. 2 hours to complete
The Cyber Incident Response course will give students an understanding of how incidents are responded to at a high level, as well as allow them to build important technical skills through the hands-on labs and projects. This course is for anyone wishing to apply learned forensics and offensive knowledge such as ethical hacking to the incident response process....
Develop and Deploy Windows Applications on Google Cloud
by Google Cloud Training- 4.2
Approx. 13 hours to complete
Learn to deploy and run Microsoft Windows® applications on Google Cloud. Through lectures and hands-on labs, learn how to configure and run Microsoft Windows and Microsoft SQL Server in Compute Engine. You will also learn how to develop and deploy ASP. NET applications and deploy them to Compute Engine, App Engine, and Google Kubernetes Engine....