Search result for Online Courses & Certifications
Get Course Alerts by Email
Cryptographic Hash and Integrity Protection
by Sang-Yoon Chang- 4.5
Approx. 9 hours to complete
Welcome to Cryptographic Hash and Integrity Protection! This course reviews cryptographic hash functions in general and their use in the forms of hash chain and hash tree (Merkle tree). Building on hash functions, the course describes message authentication focusing on message authentication code (MAC) based on symmetric keys. This course is a part of the Applied Cryptography specialization....
Networking and Security in iOS Applications
by Don Patterson , Sam Kaufman- 4.5
Approx. 14 hours to complete
You will learn to extend your knowledge of making iOS apps so that they can securely interact with web services and receive push notifications. You'll learn how to store data securely on a device using Core Data. You’ll also learn to securely deploy apps to the App Store and beta users over-the-air....
Cloud Computing Security
by Edward Chow- 4.6
Approx. 12 hours to complete
In this MOOC, we will learn Cloud Computing basics using AWS as an example, We will guide you to create AWS account, planning AWS resources for your cloud systems, create AWS EC2 instances, access them and configure the popular LAMP web services with MySQL database. We then introduce AWS Load balancing feature, create load balancing cluster for scalability and reliability....
Introduction to G Suite 日本語版
by Google Cloud Training- 0.0
Approx. 7 hours to complete
「Introduction to G Suite」は、G Suite Administration 専門講座の最初のコースです。 このシリーズは、新たに G Suite 管理者となった方を対象としたコースです。これから組織で G Suite のベスト プラクティスの確立と管理を担っていく方に適しています。これらのコースを受講することで、管理コンソールの基本機能の使い方を習得でき、ユーザーの管理、サービスへのアクセスの制御、セキュリティの設定などを行えるようになります。 一連の学習用教材、手順を追った実践演習、理解度チェックを通じて、G Suite 管理者として業務を開始するために必要なスキルをすべて身につけることができます。 このコースでは、G Suite アカウントの登録と G Suite 用 DNS レコードの設定を行います。ユーザーのプロビジョニングと管理、組織のグループおよびカレンダー リソースの作成も行います。また、Cloud Directory の概要を把握し、組織を複数の組織部門に分割してユーザーおよびサービスの管理を簡素化する方法を学びます。さらに、組織の他のユーザーに管理者権限を委任する方法も学びます。 学習目標 このコースを修了した受講者は、次のことができるようになります。 - G Suite アカウントを設定し、管理コンソールにアクセスして操作する。 - G Suite ディレクトリの主なプロパティを理解する。 - G Suite でユーザー、グループ、カレンダー リソースのプロビジョニングを行う。 - 一般的なユーザー管理タスクを実行する。...
Internet of Things: Communication Technologies
by Ganz Chockalingam , Harinath Garudadri- 4.6
Approx. 6 hours to complete
Have you wondered how “Things” talk to each other and the cloud? Do you understand the alternatives for conveying latency-sensitive real time data versus reliable signaling data? Building on the skills from the Sensing and Actuation course, we will explore protocols to exchange information between processors. You will start by using the Session Initiation Protocol (SIP) for session management....
Cybersecurity Capstone Project
by Jennifer Golbeck- 0.0
Approx. 4 hours to complete
This course presents an intensive experience during which students build a software system they intend to be secure, and then attempt to show that other students' projects are insecure, by finding flaws in them. A Note on Capstone Frequency: Please keep this in mind as you enroll into the Capstone program....
Bitcoin and Cryptocurrency Technologies
by Arvind Narayanan- 4.7
Approx. 23 hours to complete
To really understand what is special about Bitcoin, we need to understand how it works at a technical level. We’ll address the important questions about Bitcoin, such as: How does Bitcoin work? What makes Bitcoin different? How secure are your Bitcoins? How anonymous are Bitcoin users? What determines the price of Bitcoins?...
Методы и средства защиты информации
by Сорокин Александр ВладимировичTop Instructor- 4.8
Approx. 15 hours to complete
Целью курса является ознакомление слушателей с основными понятиями защиты информации, основными принципами построения систем защиты информации, а также основными категориями мер защиты информации, их возможностями с точки зрения защиты информации, сильными и слабыми сторонами. Для освоения материала курса будут полезны основные знания из общего курса физики, высшей алгебры, теории чисел, информационных технологий....
Introduction to Architecting Smart IoT Devices
by Martin Timmerman- 4
Approx. 17 hours to complete
What will you learn? Embedded Systems are so ubiquitous that some of us take them for granted: we find them in smartphones, GPS systems, airplanes and so on. But have you ever wondered how these devices actually work? If so, you're in the right place! At the end of the course, you'll be able to:...
Cybersecurity and the X-Factor
by Dr. Humayun Zafar, CEH, CISM, CRISC, PCIP , Dr. Traci Carte , Herbert J. Mattord, Ph.D., CISM, CISSP, CDP , Andy Green, Ph.D. , Michael Whitman, Ph.D., CISM, CISSP- 4.7
Approx. 12 hours to complete
What is the X-Factor? In Cybersecurity, the X-Factor related to unknown and unpredictable human behavior within and outside of your organization. “No one really knows why humans do what they do”, (David K. Reynolds), and because of this organizations can be unprepared for malicious, untrained, or even best intentioned behavior that can cause alarm and sometimes irreparable harm....