Computer Science: Systems, Security, Networking

 


 


Master Computer Science on Coursera




Customize your search:

E.g., 2017-08-19
E.g., 2017-08-19
E.g., 2017-08-19
Sep 25th 2017

Ce cours vous propose de vous former aux standards du Web de données et du Web sémantique.

Average: 10 (4 votes)
Sep 18th 2017

This course is a hands-on introduction to internet measurements. You will learn about measuring the structure of the internet and the routes through that structure, about delays, losses and connectivity, about bandwidth, and about traffic.

Average: 10 (3 votes)
Sep 14th 2017

Ce cours vous explique le fonctionnement des réseaux de données tels qu'Internet ou les réseaux téléphoniques qui permettent la communication et l'accès à l'information. Le cours décrit le vocabulaire, les concepts et les mécanismes communs à l'ensemble des réseaux informatiques. Ce MOOC décrit les protocoles de l'Internet TCP, UDP et IP.

Average: 7.5 (2 votes)

Self Paced

Learn the design fundamentals of a real-time operating system (RTOS) and how to build a Bluetooth network in this hands-on project-based course. The increased demand by consumers and businesses for more utility, connectivity and smarter and more efficient electronic technology not only creates a need for more embedded systems but also for engineers in the embedded systems field.

Average: 8 (2 votes)
Aug 28th 2017

Discover how supercomputers work and the real-life scientific breakthroughs made possible by today’s computer simulations. Today’s supercomputers are the most powerful calculating machines ever invented, capable of performing more than a thousand million million calculations every second. This gives scientists and engineers a powerful new tool to study the natural world – computer simulation.

Average: 8 (2 votes)
Aug 21st 2017

The nature of digital manufacturing and design (DM&D), and its heavy reliance on creating a digital thread of product and process data and information, makes it a prime target for hackers and counterfeiters. This course will introduce students to why creating a strong and secure infrastructure should be of paramount concern for anyone operating in the DM&D domain, and measures that can be employed to protect operational technologies, systems and resources.

Average: 4 (1 vote)

Aug 21st 2017

This course we will explore the foundations of software security. We will consider important software vulnerabilities and attacks that exploit them -- such as buffer overflows, SQL injection, and session hijacking -- and we will consider defenses that prevent or mitigate these attacks, including advanced testing and program analysis techniques. Importantly, we take a "build security in" mentality, considering techniques at each phase of the development cycle that can be used to strengthen the security of software systems.

Average: 3.1 (8 votes)
Aug 21st 2017

Welcome to the Cloud Computing Applications course, the first part of a two-course series designed to give you a comprehensive view on the world of Cloud Computing and Big Data! In this first course we cover a multitude of technologies that comprise the modern concept of cloud computing. Cloud computing is an information technology revolution that has just started to impact many enterprise computing systems in major ways, and it will change the face of computing in the years to come.

No votes yet
Aug 21st 2017

In this course you will explore information security through some introductory material and gain an appreciation of the scope and context around the subject. This includes a brief introduction to cryptography, security management and network and computer security that allows you to begin the journey into the study of information security and develop your appreciation of some key information security concepts.

No votes yet
Aug 21st 2017

Embedded Systems are so ubiquitous that some of us take them for granted: we find them in smartphones, GPS systems, airplanes and so on. But have you ever wondered how these devices actually work? If so, you're in the right place! In this course, you'll learn about the characteristics of embedded systems: the possibilities, dangers, complications and recipes for success.

Average: 6.5 (2 votes)
Aug 21st 2017

What is the X-Factor? In Cybersecurity, the X-Factor related to unknown and unpredictable human behavior within and outside of your organization. “No one really knows why humans do what they do”, (David K. Reynolds), and because of this organizations can be unprepared for malicious, untrained, or even best intentioned behavior that can cause alarm and sometimes irreparable harm.

Average: 6.7 (6 votes)

Aug 21st 2017

This course covers the fundamentals of Google Cloud Platform. This course introduces you to important concepts and terminology for working with Google Cloud Platform (GCP). You learn about, and compare, many of the computing and storage services available in Google Cloud Platform, including Google App Engine, Google Compute Engine, and Google Container Engine.

Average: 8 (1 vote)