E.g., 2016-06-30
E.g., 2016-06-30
E.g., 2016-06-30
Jul 5th 2016

In this course, we will study security and trust from the hardware perspective. Upon completing the course, students will understand the vulnerabilities in current digital system design flow and the physical attacks to these systems. They will learn that security starts from hardware design and be familiar with the tools and skills to build secure and trusted hardware.

Average: 1.8 (4 votes)
Jul 4th 2016

Our lives depend on online services. Gain essential cyber security knowledge and skills, to help protect your digital life. We shop online. We work online. We play online. We live online. As our lives increasingly depend on digital services, the need to protect our information from being maliciously disrupted or misused is really important.

Average: 7.1 (15 votes)
Jul 4th 2016

Find out how climate change will affect us, why we should care about it, and what solutions we can employ. Climate change is the biggest global challenge the human race has ever faced. Our insatiable demand for energy from fossil fuels is changing the atmosphere, and in turn changing our climate. Climate change is already affecting the physical surface of the earth, the environment that provides our life support, our food supply, economy and society. These changes will accelerate over the next few decades
In this subject you will explore the impacts of climate change; why we should care about them, the science that underpins our understanding and how we can fix the problem before it’s too late.

Average: 9.1 (7 votes)
Jun 27th 2016

Learn about South Korea’s foreign and security policy, and the global political conditions Korea is facing. South Korea is at a critical juncture, particularly from global perspectives.

No votes yet
Jun 27th 2016

This course we will explore the foundations of software security. We will consider important software vulnerabilities and attacks that exploit them -- such as buffer overflows, SQL injection, and session hijacking -- and we will consider defenses that prevent or mitigate these attacks, including advanced testing and program analysis techniques. Importantly, we take a "build security in" mentality, considering techniques at each phase of the development cycle that can be used to strengthen the security of software systems.

Average: 2.8 (6 votes)
Jun 27th 2016

This course focuses on how to design and build secure systems with a human-centric focus. We will look at basic principles of human-computer interaction, and apply these insights to the design of secure systems with the goal of developing security measures that respect human performance and their goals within a system.

Average: 6 (5 votes)
Jun 27th 2016

This course gives an introduction into the field of terrorism & counterterrorism studies. It will help you to analyze and understand these complex phenomena and discuss its impact on society with a global audience. Students, policy makers, journalists or anyone with a strong interest in understanding issues like the history, origins and nature of terrorism, security, fear management, resilience, politics, violence, foreign fighters and radicalization will find the course most relevant.

Average: 10 (7 votes)
June 13th 2016

This course uses the lives, ideals and achievements of Theodore, Franklin, and Eleanor Roosevelt to create the idea of a Rooseveltian century. It is about doing research, analyzing primary sources, and connecting all this information with a coherent and logical interpretation. It is an invitation to think critically and historically, and it wants to give you a glimpse of what it means to be a historian at work.

No votes yet
June 13th 2016

The impact of technology and networks on our lives, culture, and society continues to increase. The very fact that you can take this course from anywhere in the world requires a technological infrastructure that was designed, engineered, and built over the past sixty years. To function in an information-centric world, we need to understand the workings of network technology. This course will open up the Internet and show you how it was created, who created it and how it works. Along the way we will meet many of the innovators who developed the Internet and Web technologies that we use today.

Average: 8 (8 votes)
June 13th 2016

This course will introduce you to the foundations of modern cryptography, with an eye toward practical applications.

Average: 5.6 (5 votes)
Jun 13th 2016

Cryptography is an indispensable tool for protecting information in computer systems. In this course you will learn the inner workings of cryptographic systems and how to correctly use them in real-world applications. The course begins with a detailed discussion of how two parties who have a shared secret key can communicate securely when a powerful adversary eavesdrops and tampers with traffic.

Average: 4.8 (6 votes)
Apr 13th 2016

El contenido de este curso consiste en una introducción al mundo del Big Data orientada a conocer cómo extraer valores escondidos de los datos manejados en cualquier negocio. Se explicarán técnicas de minería de datos aplicadas en el Big Data. También se considerarán aspectos de seguridad y privacidad.

Average: 8 (1 vote)
Apr 4th 2016

En el curso se ofrecen los principales conceptos y características del régimen jurídico aplicable a la protección de los datos de carácter personal. En concreto, se presta una especial atención al contenido esencial del citado derecho según lo previsto en la Ley Orgánica de Protección de Datos (LOPD) así como en su normativa de desarrollo.

No votes yet
Self Paced

Creating a network of computers isn’t always as easy as they portray in shows and movies. It isn’t as simple as hooking up a few monitors to multiple CPUs or server systems. The process of creating and maintaining a networking system is a difficult and time consuming process that requires constant monitoring. Many companies require knowledgeable and experienced people who know their way around creating, maintaining and securing a network of computers and servers. A lot of big name companies hire certified technicians for this job.

Average: 8 (1 vote)
Self Paced

You will learn to extend your knowledge of making iOS apps so that they can securely interact with web services and receive push notifications. You'll learn how to store data securely on a device using Core Data. You’ll also learn to securely deploy apps to the App Store and beta users over-the-air. The format of the course is through a series of code tutorials. We will walk you through the creation of several apps that you can keep as a personal app toolbox.

Average: 8 (1 vote)
Self Paced

This course bring together all the essential ingredients to build a secure WordPress website. This course teaches you various tips and tricks which ensures that you website and your business is protected from malicious hackers. The course presents the contents in a easy to understand way and does not assume any technical knowledge. This quick course will help you secure your website assets and will update with the latest tactics and strategies for WordPress Security. This is a free course with a MOOC List coupon.

Average: 6 (3 votes)
Feb 22nd 2016

Understand the competing tensions of laws related to privacy and national security, and the impending consequences of this battle for our networked world.

Average: 9 (1 vote)
Feb 8th 2016

Explore the impact and ethics of using drones, special ops units and private security firms, with this free online course.

Average: 6.5 (2 votes)
Feb 8th 2016

Hackern gelingt es immer wieder, Passwörter zu stehlen, auf sensible Firmen- und Userdaten zuzugreifen und somit schlimmstenfalls ganze Unternehmen lahmzulegen. So vielfältig die Möglichkeiten sind, die das Internet seinen Nutzern bietet, so vielfältig sind auch die Angriffspunkte und potenziellen Gefahren, die vom Internet ausgehen und vielen Menschen noch nicht richtig bewusst sind. In diesem openHPI-Kurs lernen Sie die Grundbegriffe der Internetsicherheit kennen. Warum ist das Internet in seinem Grunddesign unsicher? Welches sind die Schwachstellen des Internets und wie werden diese von Cyberkriminellen ausgenutzt? Diese Fragen werden unter anderem in diesem Kurs beantwortet. Gleichzeitig erhalten Sie einige Tipps, wie Sie sich vor solchen Angriffen schützen können.

Average: 9.3 (3 votes)
Sep 24th 2015

What is the danger of terrorism, and how can the world respond effectively?

Average: 8 (1 vote)

Pages

 

Tell your friends: