Search result for Online Courses & Certifications
Get Course Alerts by Email
Asymmetric Cryptography and Key Management
by Sang-Yoon Chang- 4.7
Approx. 9 hours to complete
Welcome to Asymmetric Cryptography and Key Management! In asymmetric cryptography or public-key cryptography, the sender and the receiver use a pair of public-private keys, as opposed to the same symmetric key, and therefore their cryptographic operations are asymmetric. This course also describes some mathematical concepts, e. g. Asymmetric Cryptography Overview Instructor Introduction...
Identifying Security Vulnerabilities in C/C++Programming
by Matthew Bishop, PhD- 4.6
Approx. 23 hours to complete
This course builds upon the skills and coding practices learned in both Principles of Secure Coding and Identifying Security Vulnerabilities, courses one and two, in this specialization. This course uses the focusing technique that asks you to think about: “what to watch out for” and “where to look” to evaluate and ultimately remediate fragile C++ library code....
Cryptography and Information Theory
by Sang-Yoon Chang- 4.5
Approx. 8 hours to complete
Welcome to Cryptography and Information Theory! This course combines cryptography (the techniques for protecting information from unauthorized access) and information theory (the study of information coding and transfer). More specifically, the course studies cryptography from the information-theoretical perspectives and discuss the concepts such as entropy and the attacker knowledge capabilities, e....
Cyber Incident Response
by Keatron Evans- 4.5
Approx. 2 hours to complete
The Cyber Incident Response course will give students an understanding of how incidents are responded to at a high level, as well as allow them to build important technical skills through the hands-on labs and projects. This course is for anyone wishing to apply learned forensics and offensive knowledge such as ethical hacking to the incident response process....
Develop and Deploy Windows Applications on Google Cloud
by Google Cloud Training- 4.2
Approx. 13 hours to complete
Learn to deploy and run Microsoft Windows® applications on Google Cloud. Through lectures and hands-on labs, learn how to configure and run Microsoft Windows and Microsoft SQL Server in Compute Engine. You will also learn how to develop and deploy ASP. NET applications and deploy them to Compute Engine, App Engine, and Google Kubernetes Engine....
Packet Switching Networks and Algorithms
by Xiaobo Zhou- 4.7
Approx. 18 hours to complete
In this course, we deal with the general issues regarding packet switching networks. We discuss packet networks from two perspectives. One perspective involves external view of the network, and is concerned with services that the network provides to the transport layer that operates above it at the end systems. Frame Switching and Packet Switching...
Cybersecurity and Mobility
by Dr. Humayun Zafar, CEH, CISM, CRISC, PCIP- 4.5
Approx. 14 hours to complete
This course is for you if you are interested in transitioning toward a managerial role in cybersecurity and mobility. Through interviews with industry experts in this area, you will be able to analyze innovations powering the rapid spread of information technology and how they present new challenges for protecting data. S....
Hardware Security
by Gang Qu- 4.3
Approx. 12 hours to complete
In this course, we will study security and trust from the hardware perspective. Upon completing the course, students will understand the vulnerabilities in current digital system design flow and the physical attacks to these systems. They will learn that security starts from hardware design and be familiar with the tools and skills to build secure and trusted hardware....
Cybersecurity and the Internet of Things
by Dr. Humayun Zafar, CEH, CISM, CRISC, PCIP , Andy Green, Ph.D. , Herbert J. Mattord, Ph.D., CISM, CISSP, CDP , Michael Whitman, Ph.D., CISM, CISSP- 4.6
Approx. 11 hours to complete
Welcome! You may have heard about the Internet of Things (IoT). But you may also have wondered about what it is. Or for that matter, what does it mean to you or an organization. This course is for you if you are curious about the most recent trends and activities in the internet capabilities and concerns about programmed devices....
Hacking and Patching
by Edward Chow- 3.9
Approx. 15 hours to complete
In this MOOC, you will learn how to hack web apps with command injection vulnerabilities in a web site of your AWS Linux instance. You will learn how to search valuable information on a typical Linux systems with LAMP services, and deposit and hide Trojans for future exploitation. Injection Web App Attacks and Their Defenses...