Search result for Computer Security and Networks Online Courses & Certifications
Get Course Alerts by Email
Bitcoin and Cryptocurrency Technologies
by Arvind Narayanan- 4.7
Approx. 23 hours to complete
To really understand what is special about Bitcoin, we need to understand how it works at a technical level. We’ll address the important questions about Bitcoin, such as: How does Bitcoin work? What makes Bitcoin different? How secure are your Bitcoins? How anonymous are Bitcoin users? What determines the price of Bitcoins?...
Introduction to Architecting Smart IoT Devices
by Martin Timmerman- 4
Approx. 17 hours to complete
What will you learn? Embedded Systems are so ubiquitous that some of us take them for granted: we find them in smartphones, GPS systems, airplanes and so on. But have you ever wondered how these devices actually work? If so, you're in the right place! At the end of the course, you'll be able to:...
Cybersecurity and the X-Factor
by Dr. Humayun Zafar, CEH, CISM, CRISC, PCIP , Dr. Traci Carte , Herbert J. Mattord, Ph.D., CISM, CISSP, CDP , Andy Green, Ph.D. , Michael Whitman, Ph.D., CISM, CISSP- 4.7
Approx. 12 hours to complete
What is the X-Factor? In Cybersecurity, the X-Factor related to unknown and unpredictable human behavior within and outside of your organization. “No one really knows why humans do what they do”, (David K. Reynolds), and because of this organizations can be unprepared for malicious, untrained, or even best intentioned behavior that can cause alarm and sometimes irreparable harm....
Networks: Friends, Money, and Bytes
by Mung Chiang , Christopher Brinton- 4.7
Approx. 37 hours to complete
You pick up your iPhone while waiting in line at a coffee shop. You google a not-so-famous actor, get linked to a Wikipedia entry listing his recent movies and popular YouTube clips of several of them. You check out user reviews on Amazon and pick one, download that movie on BitTorrent or stream that in Netflix....
Secure Networked System with Firewall and IDS
by Edward Chow- 3.8
Approx. 9 hours to complete
In this MOOC, we will focus on learning how network systems are secured using firewalls and IDS. This will include understanding the basic components of network security, constructing a dual-firewall DMZ, and defining security policies to implement and enforce these rules. Building upon these lessons we will go in-depth on the popular Linux firewall....
Web Connectivity and Security in Embedded Systems
by Juha Plosila , Farhoud Hosseinpour- 4.4
Approx. 12 hours to complete
Welcome to Web Connectivity and Security in Cyber Physical Systems! In this course, we will explore several technologies that bring modern devices together, facilitating a network of connected things and making devices internet enabled. We will discuss rules, protocols, and standards for these devices to communicate with each other in the network....
DDoS Attacks and Defenses
by Edward Chow- 4.5
Approx. 15 hours to complete
In this MOOC, you will learn the history of DDoS attacks and analyze new Mirai IoT Malware and perform source code analysis. you will be provided with a brief overview of DDoS Defense techniques. You learn an Autonomous Anti-DDoS Network called A2D2 for small/medium size organizations to deal with DDoS attacks....
Advanced System Security Topics
by Edward Chow , Greg Williams- 4.5
Approx. 15 hours to complete
In this MOOC, we learn RBAC and ABAC access control to facilitate the specification and management of access policies. We learn examples of how RBAC is supported by modern systems such as Docker and AWS IAM. We learn XACML 3. We show how Google Map and Web Crytpo Enhance Security with Geolocation...
Security and Privacy in TOR Network
by Edward Chow , Greg Williams , Richard White- 4.3
Approx. 22 hours to complete
In this MOOC, we will learn about TOR basic concept and see how they protect the security and privacy of users and resist censorship. We will examine how TOR realize the anonymity and utilize its service by downloading and using Tor browser software. A recent attack on TOR’s application flow control called sniper attacks is analyzed....
Basic Cryptography and Programming with Crypto API
by Edward Chow- 4.3
Approx. 16 hours to complete
In this MOOC, we will learn the basic concepts and principles of crytography, apply basic cryptoanalysis to decrypt messages encrypted with mono-alphabetic substitution cipher, and discuss the strongest encryption technique of the one-time-pad and related quantum key distribution systems. Basic Cryptography Course Overview Basic Cryptography Kerckhoff's Principle CryptoAnalysis of Monoalphabetic Substitution Cipher...