Search result for Online Courses & Certifications
Get Course Alerts by Email
Design and Analyze Secure Networked Systems
by Edward Chow- 3.8
Approx. 15 hours to complete
In this MOOC, we will learn the basic cyber security concepts, how to identify vulnerabilities/threat in a network system. We will apply CIA basic security services in the triage of recent cyberattack incidents, such as OPM data breach. We will apply principle of least privileges for controlling the shared access given to different groups of users and system processes....
Exploiting and Securing Vulnerabilities in Java Applications
by Joubin Jabbari- 4.6
Approx. 23 hours to complete
In this course, we will wear many hats. We will also wear Defender Hats. We will dive deep in the code to fix the root cause of these issues and discuss various mitigation strategies. We do this by exploiting WebGoat, an OWASP project designed to teach penetration testing. Finally we fix these issues in WebGoat and build our patched binaries....
Cloud Networking
by P. Brighten Godfrey , Ankit Singla- 4.4
Approx. 23 hours to complete
In the cloud networking course, we will see what the network needs to do to enable cloud computing. We will explore current practice by talking to leading industry experts, as well as looking into interesting new research that might shape the cloud network’s future. Examining how these objectives are met will set the stage for the rest of the course....
Mathematical Foundations for Cryptography
by William Bahn , Richard White , Sang-Yoon Chang- 4.6
Approx. 14 hours to complete
Welcome to Course 2 of Introduction to Applied Cryptography. In this course, you will be introduced to basic mathematical principles and functions that form the foundation for cryptographic and cryptanalysis methods. These principles and functions will be helpful in understanding symmetric and asymmetric cryptographic methods examined in Course 3 and Course 4....
Введение в искусственный интеллект
by Роман Душкин- 4.8
Approx. 5 hours to complete
Что же такое этот пресловутый искусственный интеллект? Сегодня вокруг этого термина столько мифов и неправильного понимания, что зачастую отделить правду от вымысла очень сложно. Особенно масла в огонь невежества подливают журналисты и деятели массовой культуры, которые занимаются созданием мифов. Но правда в том, что искусственные интеллектуальные системы уже существуют и успешно замещают людей во многих профессиях....
Сетевое администрирование: от теории к практике
by Николай Георгиевич Булахов (Nikolay G. Bulakhov)- 4.1
Approx. 8 hours to complete
В настоящее время без сети не может обойтись ни кондитер, ни водитель. И даже дети, которые еще не ходят в школу, а то и в детский сад, уже пользуются сетями. Поэтому сейчас специалистов в этой области требуется всё больше. Наш курс поможет желающим разобраться во всех премудростях этого интереснейшей области. В этом курсе слушатели:...
Cloud Computing Applications, Part 1: Cloud Systems and Infrastructure
by Roy H. Campbell , Reza Farivar- 4.2
Approx. 15 hours to complete
Welcome to the Cloud Computing Applications course, the first part of a two-course series designed to give you a comprehensive view on the world of Cloud Computing and Big Data! In this first course we cover a multitude of technologies that comprise the modern concept of cloud computing. Course Orientation Welcome to Cloud Computing Applications Part 1...
TCP/IP and Advanced Topics
by Xiaobo Zhou- 4.7
Approx. 16 hours to complete
In this course, we give an in-depth study of the TCP/IP protocols. We examine the details of how IP enables communications across a collection of networks. We pay particular attention to the hierarchical structure of IP addresses and explain their role in ensuring scalability of the Internet. We review in details about TCP three-way handshake, flow control, and congestion control....
Cloud Computing Applications, Part 2: Big Data and Applications in the Cloud
by Reza Farivar , Roy H. Campbell- 4.3
Approx. 20 hours to complete
Welcome to the Cloud Computing Applications course, the second part of a two-course series designed to give you a comprehensive view on the world of Cloud Computing and Big Data! Cloud applications and data analytics represent a disruptive change in the ways that society is informed by, and uses information. Next we present NOSQL Databases....
Symmetric Cryptography
by Sang-Yoon Chang- 4.6
Approx. 13 hours to complete
Welcome to Symmetric Cryptography! Symmetric cryptography relies on shared secret key to ensure message confidentiality, so that the unauthorized attackers cannot retrieve the message. The course describes substitution and transposition techniques, which were the bases for classical cryptography when the message is encoded in natural language such as English. Classical Cipher: Substitution...