Search result for Online Courses & Certifications
Get Course Alerts by Email
Cybersecurity and Its Ten Domains
by Dr. Humayun Zafar, CEH, CISM, CRISC, PCIP- 4.3
Approx. 24 hours to complete
This course is designed to introduce students, working professionals and the community to the exciting field of cybersecurity. Throughout the MOOC, participants will engage in community discourse and online interaction. Participants will gain knowledge and understanding of cybersecurity and its domains. Learning will be assessed using strategies aligned to knowledge and understanding....
Introduction to Blockchain for Financial Services
by Don Tapscott , Alex Tapscott- 4.7
Approx. 29 hours to complete
In this first course of the specialization, we will discuss the limitations of the Internet for business and economic activity, and explain how blockchain technology represents the way forward. After completing this course, you will be able to explain what blockchain is, how it works, and why it is revolutionary. The Second Era of the Internet...
Blockchain in Financial Services: Strategic Action Plan
by Don Tapscott , Alex Tapscott- 4.3
Approx. 14 hours to complete
In this fourth and final course of the specialization, you will synthesize your learning into a Strategic Action Plan. The goals of this course are twofold: One, it’s for you to identify a specific need or problem within the financial services industry that can potentially be solved using blockchain technology. Industry Analysis...
Networks Illustrated: Principles without Calculus
by Christopher Brinton , Mung Chiang- 4.4
Approx. 24 hours to complete
What makes WiFi faster at home than at a coffee shop? How does Google order its search results from the trillions of webpages on the Internet? Why does Verizon charge $15 for every GB of data we use? Is it really true that we are connected in six social steps or less?...
Cryptography I
by Dan Boneh- 4.8
Approx. 23 hours to complete
Cryptography is an indispensable tool for protecting information in computer systems. In this course you will learn the inner workings of cryptographic systems and how to correctly use them in real-world applications. We will examine many deployed protocols and analyze mistakes in existing systems. Course overview and stream ciphers Course Overview...
Blockchain: Foundations and Use Cases
by ConsenSys Academy- 4.7
Approx. 10 hours to complete
This course is the definitive introduction to blockchain for both the developer and non-developer audience. Beyond the technology, this course will introduce you to some of the philosophy behind decentralization and why there is so much excitement around it. During the first three modules, you'll be introduced to blockchain and the technology behind it....
Introduction to Cyber Attacks
by Dr. Edward G. Amoroso- 4.7
Approx. 19 hours to complete
This course provides learners with a baseline understanding of common cyber security threats, vulnerabilities, and risks. An overview of how basic cyber attacks are constructed and applied to real systems is also included. Examples include simple Unix kernel hacks, Internet worms, and Trojan horses in software utilities. Introduction to Cyber Security...
Information Security: Context and Introduction
by Professor Peter Komisarczuk , Professor Keith M. Martin , Dr Jorge Blasco Alis- 4.7
Approx. 24 hours to complete
In this course you will explore information security through some introductory material and gain an appreciation of the scope and context around the subject. After completing the course you will have gained an awareness of key information security principles regarding information, confidentiality, integrity and availability. Introduction to Information Security What is Information Security?...
Google Cloud Fundamentals for AWS Professionals
by Google Cloud Training- 4.7
Approx. 13 hours to complete
This accelerated 6-hour course with labs introduces AWS professionals to the core capabilities of Google Cloud Platform (GCP) in the four technology pillars: networking, compute, storage, and database. It is designed for AWS Solution Architects and SysOps Administrators familiar with AWS features and setup and want to gain experience configuring GCP products immediately....
International Cyber Conflicts
by Sanjay Goel , Kevin Williams- 4.5
Approx. 9 hours to complete
By nature, cyber conflicts are an international issue that span across nation-state borders. By the end of the course, you will be able to apply the knowledge gained for analysis and management of international cyber incidents and conflicts including for activities such as development of policy related to cybercrime and cyberwarfare....