Master Computer Science on Coursera




E.g., 2016-08-24
E.g., 2016-08-24
E.g., 2016-08-24
Sep 8th 2016

Ce cours vous explique le fonctionnement des réseaux de données tels qu'Internet ou les réseaux téléphoniques qui permettent la communication et l'accès à l'information. Le cours décrit le vocabulaire, les concepts et les mécanismes communs à l'ensemble des réseaux informatiques. Ce MOOC décrit les protocoles de l'Internet TCP, UDP et IP.

No votes yet
Aug 22nd 2016

This course we will explore the foundations of software security. We will consider important software vulnerabilities and attacks that exploit them -- such as buffer overflows, SQL injection, and session hijacking -- and we will consider defenses that prevent or mitigate these attacks, including advanced testing and program analysis techniques. Importantly, we take a "build security in" mentality, considering techniques at each phase of the development cycle that can be used to strengthen the security of software systems.

Average: 2.8 (6 votes)
Aug 22nd 2016

Have you wondered how “Things” talk to each other and the cloud? Do you understand the alternatives for conveying latency-sensitive real time data versus reliable signaling data? Building on the skills from the Sensing and Actuation course, we will explore protocols to exchange information between processors. In this course, you will learn how VoIP systems like Skype work and implement your own app for voice calls and text messages.

Average: 7 (2 votes)
Aug 22nd 2016

Embedded Systems are so ubiquitous that some of us take them for granted: we find them in smartphones, GPS systems, airplanes and so on. But have you ever wondered how these devices actually work? If so, you're in the right place! In this course, you'll learn about the characteristics of embedded systems: the possibilities, dangers, complications and recipes for success.

No votes yet
Aug 22nd 2016

What is the X-Factor? In Cybersecurity, the X-Factor related to unknown and unpredictable human behavior within and outside of your organization. “No one really knows why humans do what they do”, (David K. Reynolds), and because of this organizations can be unprepared for malicious, untrained, or even best intentioned behavior that can cause alarm and sometimes irreparable harm.

No votes yet
Aug 22nd 2016

This course is for you if you are interested in transitioning toward a managerial role in cybersecurity and mobility. Through interviews with industry experts in this area, you will learn about innovations powering the rapid spread of information technology and how they present new challenges for protecting data.

No votes yet
Aug 22nd 2016

This course focuses on how to design and build secure systems with a human-centric focus. We will look at basic principles of human-computer interaction, and apply these insights to the design of secure systems with the goal of developing security measures that respect human performance and their goals within a system.

Average: 6 (5 votes)
Aug 15th 2016

You will learn to extend your knowledge of making iOS apps so that they can securely interact with web services and receive push notifications. You'll learn how to store data securely on a device using Core Data. You’ll also learn to securely deploy apps to the App Store and beta users over-the-air.

Average: 8 (1 vote)
Aug 15th 2016

By nature, cyber conflicts are an international issue that span across nation-state borders. By the end of the course, you will be able to apply the knowledge gained for analysis and management of international cyber incidents and conflicts including for activities such as development of policy related to cybercrime and cyberwarfare.

No votes yet
Aug 15th 2016

Welcome to “Cybersecurity and the Internet of Things”! This course is for you if you are curious about the most recent trends and activities in the internet capabilities and concerns about programmed devices. There are complexities and areas of necessary awareness when the industrial sector becomes connected to your home.

No votes yet
Aug 15th 2016

The Raspberry Pi is a small, affordable single-board computer that you will use to design and develop fun and practical IoT devices while learning programming and computer hardware.

Average: 6.9 (8 votes)
Aug 15th 2016

This course is designed to introduce students, working professionals and the community to the exciting field of cybersecurity. Throughout the MOOC, participants will engage in community discourse and online interaction. Participants will gain knowledge and understanding of cybersecurity and its domains.

Average: 7.5 (4 votes)
Aug 15th 2016

In this course, we will study security and trust from the hardware perspective. Upon completing the course, students will understand the vulnerabilities in current digital system design flow and the physical attacks to these systems. They will learn that security starts from hardware design and be familiar with the tools and skills to build secure and trusted hardware.

Average: 3.3 (6 votes)
Aug 8th 2016

The impact of technology and networks on our lives, culture, and society continues to increase. The very fact that you can take this course from anywhere in the world requires a technological infrastructure that was designed, engineered, and built over the past sixty years. To function in an information-centric world, we need to understand the workings of network technology. This course will open up the Internet and show you how it was created, who created it and how it works. Along the way we will meet many of the innovators who developed the Internet and Web technologies that we use today.

Average: 7.7 (9 votes)
Aug 8th 2016

In this course, you'll learn what every citizen should know about the security risks--and future potential — of electronic voting and Internet voting. We'll take a look at the past, present, and future of election technologies and explore the various spaces intersected by voting, including computer security, human factors, public policy, and more.

No votes yet
Aug 8th 2016

What makes WiFi faster at home than at a coffee shop? How does Google order its search results from the trillions of webpages on the Internet? Why does Verizon charge $15 for every GB of data we use? Is it really true that we are connected in six social steps or less? These are just a few of the many intriguing questions we can ask about the social and technical networks that form integral parts of our daily lives. This course is about exploring the answers, using a language that anyone can understand.

Average: 10 (2 votes)
Aug 8th 2016

Smartphones are one of the most influential devices that we use in our everyday lives. Smartphones consist of the most advanced hardware and software technologies that exist in the world, all combined together into a miraculous single easy-to-use portable system.

Average: 3 (1 vote)
Aug 8th 2016

Welcome to the Cloud Computing Applications course, the first part of a two-course series designed to give you a comprehensive view on the world of Cloud Computing and Big Data! In this first course we cover a multitude of technologies that comprise the modern concept of cloud computing. Cloud computing is an information technology revolution that has just started to impact many enterprise computing systems in major ways, and it will change the face of computing in the years to come.

No votes yet
Aug 8th 2016

This course will introduce you to the foundations of modern cryptography, with an eye toward practical applications.

Average: 5.6 (5 votes)
Aug 8th 2016

You have most likely heard about Clouds and Big Data before, and already know how significantly important they are and will be in the future.

Average: 2.3 (3 votes)

Pages

 

Tell your friends: