Search result for Online Courses & Certifications
Get Course Alerts by Email
Blockchain Scalability and its Foundations in Distributed Systems
by Vincent Gramoli- 4.7
Approx. 11 hours to complete
Blockchain promises to disrupt industries once it will be efficient at large scale. In this course, you will learn how to make blockchain scale. You will learn about the foundational problem of distributed computing, consensus, that is key to create blocks securely. In particular, this course will help you: * understand security vulnerabilities of mainstream blockchains;...
Software Defined Networking
by Dr. Nick Feamster- 4.6
Approx. 32 hours to complete
In this course, you will learn about software defined networking and how it is changing the way communications networks are managed, maintained, and secured. Week One Introduction to SDN (Summer 2015): What's New Overview Part 1 Overview Part 2 Central Control Active Networks Network Virtualization From FORCES to Ethane: Control Plane Evolution...
Identifying Security Vulnerabilities
by Sandra Escandor-O'Keefe- 4.6
Approx. 13 hours to complete
This course will help you build a foundation of some of the fundamental concepts in secure programming. We will learn about the concepts of threat modeling and cryptography and you'll be able to start to create threat models, and think critically about the threat models created by other people. Foundational Topics in Secure Programming...
Cryptography
by Jonathan Katz- 4.6
Approx. 18 hours to complete
This course will introduce you to the foundations of modern cryptography, with an eye toward practical applications. Week 1 Course Overview Introduction Introduction Continued Hex and ASCII Breaking the Vigenere Cipher Principles of Modern Cryptography Perfect Secrecy Perfect Secrecy Part II The One-Time Pad Implementing the One-Time Pad Syllabus Programming Assignments...
Planning for your G Suite Deployment
by Google Cloud Training- 4.8
Approx. 5 hours to complete
Planning for your G Suite Deployment is the final course in the G Suite Administration series. In this course, you will be introduced to Google's deployment methodology and best practices. You will take the role of Jon, the Technical Project Lead at Galaxy Sola. Your job is to deploy G Suite to your users with minimal disruption....
Enterprise and Infrastructure Security
by Dr. Edward G. Amoroso- 4.7
Approx. 15 hours to complete
This course introduces a series of advanced and current topics in cyber security, many of which are especially relevant in modern enterprise and infrastructure settings. The basics of enterprise compliance frameworks are provided with introduction to NIST and PCI. Mobile security and cloud security hyper-resilience approaches are also introduced. Security Awareness, Compliance, Assessments, and Risk...
Real-Time Cyber Threat Detection and Mitigation
by Dr. Edward G. Amoroso- 4.7
Approx. 15 hours to complete
This course introduces real-time cyber security techniques and methods in the context of the TCP/IP protocol suites. Explanation of some basic TCP/IP security hacks is used to introduce the need for network security solutions such as stateless and stateful firewalls. Perimeter solutions such as firewalls and intrusion prevention systems are shown to have significant drawbacks in common enterprise environments....
Введение в технологию блокчейн
by Жаворонков Никита- 4.6
Approx. 8 hours to complete
Уже долгое время со всех сторон звучат слова "блокчейн" и "криптовалюта". Говорят, что блокчейн — прорыв и за ним будущее. Но что стоит за этим понятием, какую пользу приносит блокчейн обществу, бизнесу и человеку? В этом мы и поможем вам разобраться. В курсе «Введение в технологию блокчейн» вы узнаете: 1. Что такое блокчейн, сферы применения, механизм и принципы работы....
Classical Cryptosystems and Core Concepts
by William Bahn , Richard White , Sang-Yoon Chang- 4.6
Approx. 12 hours to complete
Welcome to Introduction to Applied Cryptography. Cryptography is an essential component of cybersecurity. The need to protect sensitive information and ensure the integrity of industrial control processes has placed a premium on cybersecurity skills in today’s information technology market. Demand for cybersecurity jobs is expected to rise 6 million globally by 2019, with a projected shortfall of 1....
Peer-to-Peer Protocols and Local Area Networks
by Xiaobo Zhou- 4.7
Approx. 16 hours to complete
In this course, we discuss peer-to-peer protocols and local area networks. Part one in this course is to answer the question of how does a peer-to-peer protocol deliver reliable data transfer service across unreliable transmission lines or networks. We focus on several medium access control protocols and their performance analysis. We further discuss local area network and wireless LAN....