Search result for Online Courses & Certifications
Get Course Alerts by Email
Networks: Friends, Money, and Bytes
by Mung Chiang , Christopher Brinton- 4.7
Approx. 37 hours to complete
You pick up your iPhone while waiting in line at a coffee shop. You google a not-so-famous actor, get linked to a Wikipedia entry listing his recent movies and popular YouTube clips of several of them. You check out user reviews on Amazon and pick one, download that movie on BitTorrent or stream that in Netflix....
Secure Networked System with Firewall and IDS
by Edward Chow- 3.8
Approx. 9 hours to complete
In this MOOC, we will focus on learning how network systems are secured using firewalls and IDS. This will include understanding the basic components of network security, constructing a dual-firewall DMZ, and defining security policies to implement and enforce these rules. Building upon these lessons we will go in-depth on the popular Linux firewall....
Web Connectivity and Security in Embedded Systems
by Juha Plosila , Farhoud Hosseinpour- 4.4
Approx. 12 hours to complete
Welcome to Web Connectivity and Security in Cyber Physical Systems! In this course, we will explore several technologies that bring modern devices together, facilitating a network of connected things and making devices internet enabled. We will discuss rules, protocols, and standards for these devices to communicate with each other in the network....
DDoS Attacks and Defenses
by Edward Chow- 4.5
Approx. 15 hours to complete
In this MOOC, you will learn the history of DDoS attacks and analyze new Mirai IoT Malware and perform source code analysis. you will be provided with a brief overview of DDoS Defense techniques. You learn an Autonomous Anti-DDoS Network called A2D2 for small/medium size organizations to deal with DDoS attacks....
Advanced System Security Topics
by Edward Chow , Greg Williams- 4.5
Approx. 15 hours to complete
In this MOOC, we learn RBAC and ABAC access control to facilitate the specification and management of access policies. We learn examples of how RBAC is supported by modern systems such as Docker and AWS IAM. We learn XACML 3. We show how Google Map and Web Crytpo Enhance Security with Geolocation...
Security and Privacy in TOR Network
by Edward Chow , Greg Williams , Richard White- 4.3
Approx. 22 hours to complete
In this MOOC, we will learn about TOR basic concept and see how they protect the security and privacy of users and resist censorship. We will examine how TOR realize the anonymity and utilize its service by downloading and using Tor browser software. A recent attack on TOR’s application flow control called sniper attacks is analyzed....
Basic Cryptography and Programming with Crypto API
by Edward Chow- 4.3
Approx. 16 hours to complete
In this MOOC, we will learn the basic concepts and principles of crytography, apply basic cryptoanalysis to decrypt messages encrypted with mono-alphabetic substitution cipher, and discuss the strongest encryption technique of the one-time-pad and related quantum key distribution systems. Basic Cryptography Course Overview Basic Cryptography Kerckhoff's Principle CryptoAnalysis of Monoalphabetic Substitution Cipher...
The Business of Cybersecurity Capstone
by Dr. Humayun Zafar, CEH, CISM, CRISC, PCIP , Dr. Traci Carte , Herbert J. Mattord, Ph.D., CISM, CISSP, CDP , Andy Green, Ph.D. , Michael Whitman, Ph.D., CISM, CISSP- 4.9
Approx. 17 hours to complete
This course intends to make the student familiar with information security management. When you have finished with this course you will know more about: • Governance: including the mission, roles and responsibilities of the InfoSec governance function, and the strategic planning process and InfoSec’s role in the organization’s strategic planning effort....
Cloud Computing Project
by Indranil Gupta , Roy H. Campbell , P. Brighten Godfrey , Ankit Singla- 4.1
Approx. 21 hours to complete
Note: You should complete all the other courses in this Specialization before beginning this course. Orientation Welcome to the Cloud Computing Project! Orientation Overview Syllabus Project Overview About the Discussion Forums Updating Your Profile Week 1 - Task Overview Task 1 Overview Task 1 Rubric Task 1 Queries Week 2 Week 2 Overview...
操作系统与虚拟化安全
by Prof. 沈晴霓 (Shen Qingni), Ph.D.- 0.0
Approx. 28 hours to complete
操作系统是计算机系统的基础软件,而系统虚拟化已成为云计算平台的核心技术,没有它们提供的安全性,这些计算机系统及其上数据的安全性都将无法保障。本课程将从理论与工程实践相结合的角度,介绍操作系统(Linux)与系统虚拟化(Xen)安全相关理论、技术和方法,包括:安全概念、安全机制、安全模型、安全体系结构、安全开发方法、安全标准与评测方法等,帮助你深入学习和理解该领域的知识体系、实践技术和方法。 计算机系统安全的重要性与评测标准 1. 1 课程简介 1. 2 计算机系统的安全性 1. 3 操作系统安全的重要性 1. 4 安全与可信的区别 1. 5 安全操作系统的国内外研发现状 1. 6 美国TCSEC标准与可信评估等级 1. 7 欧盟ITSEC标准与CC标准的产生 1. 8 国际CC标准的主要内容及其应用 第一周测试 计算机系统基本安全概念和设计思想 2. 1 主体、客体和访问控制矩阵与通用安全需求 2. 2 安全三要素与安全策略 2. 3 安全建模思想 2. 4 引用监控器概念与安全内核设计思想 2. 5 安全周界与可信计算基等概念 第二周测试 访问控制机制 3. 1 访问控制任务与自主访问控制定义 3. 2 自主访问控制机制实现技术分类...