Learn about the inner workings of cryptographic primitives and protocols and how to apply this knowledge in real-world applications.
Computer Science: Systems, Security, Networking
Enter the world of signal processing: analyze and extract meaning from the signals around us!
This course provides an overview of the evolving field of cybersecurity, with an introduction to cybersecurity standards and law.
Learn what you need to know to develop applications against MongoDB using Node.js.
El curso pretende alcanzar los siguientes objetivos:
- Realizar una aproximación general al concepto, la historia y los tipos de redes sociales que existen.
- Aproximación jurídica al concepto de red social y las complejidades que la normativa actual plantea ante los retos de los usuarios en las redes sociales.
- Familiarizar al usuario acerca del concepto de privacidad y como manejar la misma en las principales redes sociales.
- Familiarizar al usuario con el concepto de propiedad intelectual, así como con los márgenes y límites a su ejercicio.
Learn about the inner workings of cryptographic primitives and how to apply this knowledge in real-world applications!
Learn everything you need to know to get started building a MongoDB-based app.
This course introduces concepts, languages, techniques, and patterns for programming heterogeneous, massively parallel processors. Its contents and structure have been significantly revised based on the experience gained from its initial offering in 2012. It covers heterogeneous computing architectures, data-parallel programming models, techniques for memory bandwidth management, and parallel algorithm patterns.
The Internet is a computer network that millions of people use every day. Understand the design strategies used to solve computer networking problems while you learn how the Internet works.
In this course, you will explore several structured, risk management approaches that guide information security decision-making.
Learn to defend and protect vital company information using the latest technology and defense strategies. Analyze internal and external threats to proactively prevent information attacks. Gain experience by solving real-world problems and leave the class equipped to establish and oversee information security.
This course provides you with opportunities to integrate and apply your information security knowledge.
Learn everything you need to know to administer a MongoDB installation in production.
Wild, wild web: Is the Internet a lawless no man’s land? Based on the recent public debate on data protection and massive privacy infringements, this course will explore the connection between cyber security and international human rights.
Learn everything you need to know to get started building a MongoDB-based app (Python).
A lo largo de este curso vamos a estudiar desde cero el fenómeno de las redes sociales, profundizando en las Comunidades virtuales y los nuevos roles como el de Community Manager o el de curador de contenidos.
Explore how the web has changed our world in the past 25 years and what might happen next.
In this course, you'll learn what every citizen should know about the security risks--and future potential — of electronic voting and Internet voting.
What is the Internet? How was it created? How does it work?
In this course, you will learn to design the computer architecture of complex modern microprocessors.