Computer Science: Systems, Security, Networking

 

 


 


Master Computer Science on Coursera




Customize your search:

E.g., 2017-03-27
E.g., 2017-03-27
E.g., 2017-03-27
Apr 10th 2017

Our lives depend on online services. Gain essential cyber security knowledge and skills, to help protect your digital life. We shop online. We work online. We play online. We live online. As our lives increasingly depend on digital services, the need to protect our information from being maliciously disrupted or misused is really important.

Average: 6.4 (25 votes)
Apr 3rd 2017

This course focuses on how to design and build secure systems with a human-centric focus. We will look at basic principles of human-computer interaction, and apply these insights to the design of secure systems with the goal of developing security measures that respect human performance and their goals within a system.

Average: 5.8 (8 votes)
Apr 3rd 2017

This course we will explore the foundations of software security. We will consider important software vulnerabilities and attacks that exploit them -- such as buffer overflows, SQL injection, and session hijacking -- and we will consider defenses that prevent or mitigate these attacks, including advanced testing and program analysis techniques. Importantly, we take a "build security in" mentality, considering techniques at each phase of the development cycle that can be used to strengthen the security of software systems.

Average: 3.3 (7 votes)
Apr 3rd 2017

Have you wondered how “Things” talk to each other and the cloud? Do you understand the alternatives for conveying latency-sensitive real time data versus reliable signaling data? Building on the skills from the Sensing and Actuation course, we will explore protocols to exchange information between processors. In this course, you will learn how VoIP systems like Skype work and implement your own app for voice calls and text messages.

Average: 7 (2 votes)
Apr 3rd 2017

Welcome to the Cloud Computing Applications course, the first part of a two-course series designed to give you a comprehensive view on the world of Cloud Computing and Big Data! In this first course we cover a multitude of technologies that comprise the modern concept of cloud computing. Cloud computing is an information technology revolution that has just started to impact many enterprise computing systems in major ways, and it will change the face of computing in the years to come.

No votes yet
Apr 3rd 2017

Embedded Systems are so ubiquitous that some of us take them for granted: we find them in smartphones, GPS systems, airplanes and so on. But have you ever wondered how these devices actually work? If so, you're in the right place! In this course, you'll learn about the characteristics of embedded systems: the possibilities, dangers, complications and recipes for success.

Average: 10 (1 vote)
Apr 3rd 2017

This course is for you if you are interested in transitioning toward a managerial role in cybersecurity and mobility. Through interviews with industry experts in this area, you will learn about innovations powering the rapid spread of information technology and how they present new challenges for protecting data.

Average: 5.4 (7 votes)
Self Paced

Learn how to successfully migrate an enterprise environment to Windows 10 using the Microsoft deployment toolkit. This computer science course will help IT professionals with one of their biggest challenges, moving away from an earlier version of the Windows operating system (OS) to Windows 10.

No votes yet
Self-Paced

Learn to manage Windows 10 desktop and application deployments as well as cloud-based application and data service environments for medium-to-large enterprises. Learn to manage Windows 10 desktop and application deployments as well as cloud-based application and data service environments for medium-to-large enterprises.

No votes yet
Self Paced

Aprenderás a planificar una búsqueda desde el comienzo y a utilizar las herramientas que Internet te ofrece para encontrar lo que buscas. En un mundo virtual en el que hay cientos de millones de páginas disponibles con informacion de todo tipo, buscar en Internet de forma eficaz es una habilidad cada día más necesaria. Aprende con nosotros a separar el grano de la paja usando las herramientas disponibles y realizando las preguntas de forma adecuada.

No votes yet
Mar 27th 2017

You will learn to extend your knowledge of making iOS apps so that they can securely interact with web services and receive push notifications. You'll learn how to store data securely on a device using Core Data. You’ll also learn to securely deploy apps to the App Store and beta users over-the-air.

Average: 8 (7 votes)
Mar 27th 2017

By nature, cyber conflicts are an international issue that span across nation-state borders. By the end of the course, you will be able to apply the knowledge gained for analysis and management of international cyber incidents and conflicts including for activities such as development of policy related to cybercrime and cyberwarfare.

Average: 6.5 (2 votes)
Mar 27th 2017

Welcome to “Cybersecurity and the Internet of Things”! This course is for you if you are curious about the most recent trends and activities in the internet capabilities and concerns about programmed devices. There are complexities and areas of necessary awareness when the industrial sector becomes connected to your home.

Average: 5.5 (4 votes)
Mar 27th 2017

Welcome to the Cloud Computing Applications course, the second part of a two-course series designed to give you a comprehensive view on the world of Cloud Computing and Big Data!

Average: 7.4 (5 votes)
Mar 27th 2017

This course is designed to introduce students, working professionals and the community to the exciting field of cybersecurity. Throughout the MOOC, participants will engage in community discourse and online interaction. Participants will gain knowledge and understanding of cybersecurity and its domains.

Average: 5.9 (11 votes)
Mar 27th 2017

The Raspberry Pi is a small, affordable single-board computer that you will use to design and develop fun and practical IoT devices while learning programming and computer hardware.

Average: 7.6 (13 votes)
Mar 27th 2017

In this course, we will study security and trust from the hardware perspective. Upon completing the course, students will understand the vulnerabilities in current digital system design flow and the physical attacks to these systems. They will learn that security starts from hardware design and be familiar with the tools and skills to build secure and trusted hardware.

Average: 4.3 (7 votes)
Mar 27th 2017

In the cloud networking course, we will see what the network needs to do to enable cloud computing. We will explore current practice by talking to leading industry experts, as well as looking into interesting new research that might shape the cloud network’s future.

This course will allow us to explore in-depth the challenges for cloud networking—how do we build a network infrastructure that provides the agility to deploy virtual networks on a shared infrastructure, that enables both efficient transfer of big data and low latency communication, and that enables applications to be federated across countries and continents? Examining how these objectives are met will set the stage for the rest of the course.

Average: 7.5 (2 votes)
Mar 27th 2017

Explore different methods to defend, deter and detect attacks on your business’s systems, with this free network security course. Network security is of growing concern for businesses, with daily attacks occurring on internal systems. Increasingly, staff need to be more aware of network security issues, and how to protect themselves and their businesses from attack.

No votes yet
Mar 21st 2017

Explore the tradeoffs in designing communication systems like mobile phones, and the engineering tools to handle them. Have you ever wondered how information is transmitted using your mobile phone or a WiFi hotspot? This introductory course seeks to enable you to understand the basic engineering tools used and tradeoffs encountered in the design of these communication systems.

Average: 6 (1 vote)

Pages