Search result for Online Courses & Certifications
Get Course Alerts by Email
Principles of Secure Coding
by Matthew Bishop, PhD- 4.4
Approx. 16 hours to complete
This course introduces you to the principles of secure programming. It begins by discussing the philosophy and principles of secure programming, and then presenting robust programming and the relationship between it and secure programming. We’ll examine eight design principles that govern secure coding and how to apply them to your own work....
Fundamentals of Network Communication
by Xiaobo Zhou- 4.6
Approx. 15 hours to complete
In this course, we trace the evolution of networks and identify the key concepts and functions that form the basis for layered architecture. We introduce examples of protocols and services that are familiar to the students, and we explain how these services are supported by networks. Communication Networks and Services Welcome...
G Suite Security
by Google Cloud Training- 4.7
Approx. 6 hours to complete
G Suite Security is the third course in the G Suite Administration series. In this course you will focus on the various aspects of G Suite Security including user password policies and how to enable and enforce two step verification (2SV) for your users. You will also become familiar with the SSO options in G Suite....
计算机组成 Computer Organization
by 陆俊林(Lu Junlin)- 4.8
Approx. 20 hours to complete
本课程重点讲述计算机的内部结构和工作原理,着眼于软件和硬件的衔接互动,注重基本概念和真实系统的对应。 课程介绍——欢迎选修计算机组成 计算机组成章节简介 第一讲 计算机基本结构 101-电子计算机的兴起 102-冯·诺依曼结构的要点 103-冯·诺依曼结构的小故事 104-计算机结构的简化模型 105-计算机执行指令的过程 106-计算机输入和输出 107-冯诺依曼结构和具体实现 课程大纲 Syllabus 常见问题 FAQ 评分方案 Grading and Logistics 计算机基本结构quiz 第二讲 指令系统体系结构 201-设计自己的计算机 202-x86体系结构 203-x86指令简介 204-复杂的x86指令举例 205-MIPS体系结构 206-MIPS指令简介 指令系统体系结构quiz 第三讲 算术逻辑单元 301-算术运算和逻辑运算 302-门电路的基本原理 303-寄存器的基本原理 304-逻辑运算的实现 305-加法和减法的实现 306-加法器的优化 算术逻辑单元quiz 第四讲 乘法器和除法器 401-乘法的运算过程 402-乘法器的实现 403-乘法器的优化1 404-乘法器的优化2 405-除法的运算过程 406-除法器的实现 407-除法器的优化 乘法器和除法器quiz 第五讲 单周期处理器...
Software Security
by Michael Hicks- 4.6
Approx. 18 hours to complete
This course we will explore the foundations of software security. We will consider important software vulnerabilities and attacks that exploit them -- such as buffer overflows, SQL injection, and session hijacking -- and we will consider defenses that prevent or mitigate these attacks, including advanced testing and program analysis techniques. OVERVIEW...
Менеджмент информационной безопасности
by Сорокин Александр ВладимировичTop Instructor- 4.8
Approx. 11 hours to complete
Целью курса является ознакомление слушателей с основными принципами организации защиты информации, местом деятельности по защите информации в политике государства и в деятельности организации. Для освоения материала курса будут полезны основные знания в области компьютерных сетей. Их наличие позволит понять принципы действия систем обнаружения атак, принципы их выбора и размещения в защищаемой системе....
G Suite Mail Management
by Google Cloud Training- 4.8
Approx. 6 hours to complete
G Suite Mail Management is the fourth course in the G Suite Administration series. In this course you will learn how to protect your organization against spam, spoofing, phishing and malware attacks. You will configure email compliance and learn how to implement data loss prevention (DLP) for your organization. Learning Objectives...
Blockchain Transformations of Financial Services
by Don Tapscott , Alex Tapscott- 4.7
Approx. 16 hours to complete
The current global financial system is riddled with inefficiencies, uneven developments, and bizarre contradictions. Blockchain technology has the potential to bring about profound changes to financial services. In this course, you will learn how blockchain technology will disrupt the core functions of the financial services industry, offering individuals and organizations alike real choices in how they create and manage value....
Cyber Attack Countermeasures
by Dr. Edward G. Amoroso- 4.8
Approx. 19 hours to complete
This course introduces the basics of cyber defense starting with foundational models such as Bell-LaPadula and information flow frameworks. These underlying policy enforcements mechanisms help introduce basic functional protections, starting with authentication methods. Learners will be introduced to a series of different authentication solutions and protocols, including RSA SecureID and Kerberos, in the context of a canonical schema....
Securing Digital Democracy
by J. Alex Halderman- 4.8
Approx. 14 hours to complete
In this course, you'll learn what every citizen should know about the security risks--and future potential — of electronic voting and Internet voting. We'll take a look at the past, present, and future of election technologies and explore the various spaces intersected by voting, including computer security, human factors, public policy, and more....