Search result for Computer Security and Networks Online Courses & Certifications
Get Course Alerts by Email
Packet Switching Networks and Algorithms
by Xiaobo Zhou- 4.7
Approx. 18 hours to complete
In this course, we deal with the general issues regarding packet switching networks. We discuss packet networks from two perspectives. One perspective involves external view of the network, and is concerned with services that the network provides to the transport layer that operates above it at the end systems. Frame Switching and Packet Switching...
Cybersecurity and Mobility
by Dr. Humayun Zafar, CEH, CISM, CRISC, PCIP- 4.5
Approx. 14 hours to complete
This course is for you if you are interested in transitioning toward a managerial role in cybersecurity and mobility. Through interviews with industry experts in this area, you will be able to analyze innovations powering the rapid spread of information technology and how they present new challenges for protecting data. S....
Hardware Security
by Gang Qu- 4.3
Approx. 12 hours to complete
In this course, we will study security and trust from the hardware perspective. Upon completing the course, students will understand the vulnerabilities in current digital system design flow and the physical attacks to these systems. They will learn that security starts from hardware design and be familiar with the tools and skills to build secure and trusted hardware....
Cybersecurity and the Internet of Things
by Dr. Humayun Zafar, CEH, CISM, CRISC, PCIP , Andy Green, Ph.D. , Herbert J. Mattord, Ph.D., CISM, CISSP, CDP , Michael Whitman, Ph.D., CISM, CISSP- 4.6
Approx. 11 hours to complete
Welcome! You may have heard about the Internet of Things (IoT). But you may also have wondered about what it is. Or for that matter, what does it mean to you or an organization. This course is for you if you are curious about the most recent trends and activities in the internet capabilities and concerns about programmed devices....
Hacking and Patching
by Edward Chow- 3.9
Approx. 15 hours to complete
In this MOOC, you will learn how to hack web apps with command injection vulnerabilities in a web site of your AWS Linux instance. You will learn how to search valuable information on a typical Linux systems with LAMP services, and deposit and hide Trojans for future exploitation. Injection Web App Attacks and Their Defenses...
Cryptographic Hash and Integrity Protection
by Sang-Yoon Chang- 4.5
Approx. 9 hours to complete
Welcome to Cryptographic Hash and Integrity Protection! This course reviews cryptographic hash functions in general and their use in the forms of hash chain and hash tree (Merkle tree). Building on hash functions, the course describes message authentication focusing on message authentication code (MAC) based on symmetric keys. This course is a part of the Applied Cryptography specialization....
Networking and Security in iOS Applications
by Don Patterson , Sam Kaufman- 4.5
Approx. 14 hours to complete
You will learn to extend your knowledge of making iOS apps so that they can securely interact with web services and receive push notifications. You'll learn how to store data securely on a device using Core Data. You’ll also learn to securely deploy apps to the App Store and beta users over-the-air....
Cloud Computing Security
by Edward Chow- 4.6
Approx. 12 hours to complete
In this MOOC, we will learn Cloud Computing basics using AWS as an example, We will guide you to create AWS account, planning AWS resources for your cloud systems, create AWS EC2 instances, access them and configure the popular LAMP web services with MySQL database. We then introduce AWS Load balancing feature, create load balancing cluster for scalability and reliability....
Internet of Things: Communication Technologies
by Ganz Chockalingam , Harinath Garudadri- 4.6
Approx. 6 hours to complete
Have you wondered how “Things” talk to each other and the cloud? Do you understand the alternatives for conveying latency-sensitive real time data versus reliable signaling data? Building on the skills from the Sensing and Actuation course, we will explore protocols to exchange information between processors. You will start by using the Session Initiation Protocol (SIP) for session management....
Cybersecurity Capstone Project
by Jennifer Golbeck- 0.0
Approx. 4 hours to complete
This course presents an intensive experience during which students build a software system they intend to be secure, and then attempt to show that other students' projects are insecure, by finding flaws in them. A Note on Capstone Frequency: Please keep this in mind as you enroll into the Capstone program....