Computer Science: Systems, Security, Networking

 

 


 


Master Computer Science on Coursera




Customize your search:

E.g., 2017-01-22
E.g., 2017-01-22
E.g., 2017-01-22
Jan 23rd 2017

Every information service is connected through the Internet. If your work is any bit related to information, there is no excuse, you have to know what the Internet is and how it works! The relation of information and the Internet is equivalent to the blood and blood vessels of our body, which we have been using and will be using every day of our lives.

Average: 5.8 (6 votes)
Jan 23rd 2017

This course covers the fundamentals of Google Cloud Platform. This course introduces you to important concepts and terminology for working with Google Cloud Platform (GCP). You learn about, and compare, many of the computing and storage services available in Google Cloud Platform, including Google App Engine, Google Compute Engine, and Google Container Engine.

Average: 8 (1 vote)
Jan 23rd 2017

What makes WiFi faster at home than at a coffee shop? How does Google order its search results from the trillions of webpages on the Internet? Why does Verizon charge $15 for every GB of data we use? Is it really true that we are connected in six social steps or less? These are just a few of the many intriguing questions we can ask about the social and technical networks that form integral parts of our daily lives. This course is about exploring the answers, using a language that anyone can understand.

Average: 10 (2 votes)
Jan 23rd 2017

Welcome to the Cloud Computing Applications course, the first part of a two-course series designed to give you a comprehensive view on the world of Cloud Computing and Big Data! In this first course we cover a multitude of technologies that comprise the modern concept of cloud computing. Cloud computing is an information technology revolution that has just started to impact many enterprise computing systems in major ways, and it will change the face of computing in the years to come.

No votes yet
Jan 23rd 2017

The impact of technology and networks on our lives, culture, and society continues to increase. The very fact that you can take this course from anywhere in the world requires a technological infrastructure that was designed, engineered, and built over the past sixty years. To function in an information-centric world, we need to understand the workings of network technology. This course will open up the Internet and show you how it was created, who created it and how it works. Along the way we will meet many of the innovators who developed the Internet and Web technologies that we use today.

Average: 7.7 (9 votes)
Jan 23rd 2017

There’s a lot of excitement about Bitcoin, but also a lot of confusion about what Bitcoin is and how it works. We’re offering this course focusing on the computer science behind Bitcoin to help cut through the hype and get to the core of what makes Bitcoin unique.

Average: 7.8 (4 votes)
Jan 23rd 2017

You pick up your iPhone while waiting in line at a coffee shop. You google a not-so-famous actor, get linked to a Wikipedia entry listing his recent movies and popular YouTube clips of several of them. You check out user reviews on Amazon and pick one, download that movie on BitTorrent or stream that in Netflix. But suddenly the WiFi logo on your phone is gone and you're on 3G.

Average: 7 (3 votes)
Jan 23rd 2017

What is the X-Factor? In Cybersecurity, the X-Factor related to unknown and unpredictable human behavior within and outside of your organization. “No one really knows why humans do what they do”, (David K. Reynolds), and because of this organizations can be unprepared for malicious, untrained, or even best intentioned behavior that can cause alarm and sometimes irreparable harm.

Average: 7.5 (4 votes)
Jan 23rd 2017

In this course, you'll learn what every citizen should know about the security risks--and future potential — of electronic voting and Internet voting. We'll take a look at the past, present, and future of election technologies and explore the various spaces intersected by voting, including computer security, human factors, public policy, and more.

No votes yet
Jan 23rd 2017

This course will introduce you to the foundations of modern cryptography, with an eye toward practical applications.

Average: 5.9 (11 votes)
Jan 23rd 2017

This course is for you if you are interested in transitioning toward a managerial role in cybersecurity and mobility. Through interviews with industry experts in this area, you will learn about innovations powering the rapid spread of information technology and how they present new challenges for protecting data.

Average: 5.2 (5 votes)
Jan 23rd 2017

You have most likely heard about Clouds and Big Data before, and already know how significantly important they are and will be in the future.

Average: 3.8 (9 votes)
Jan 23rd 2017

This course will teach you how to develop an embedded systems device. In order to reduce the time to market, many pre-made hardware and software components are available today. You'll discover all the available hardware and software components, such as processor families, operating systems, boards and networks. You'll also learn how to actually use and integrate these components.

No votes yet
Jan 23rd 2017

Cryptography is an indispensable tool for protecting information in computer systems. In this course you will learn the inner workings of cryptographic systems and how to correctly use them in real-world applications. The course begins with a detailed discussion of how two parties who have a shared secret key can communicate securely when a powerful adversary eavesdrops and tampers with traffic.

Average: 5.7 (13 votes)
Jan 16th 2017

Welcome to the Cloud Computing Applications course, the second part of a two-course series designed to give you a comprehensive view on the world of Cloud Computing and Big Data!

Average: 7.8 (4 votes)
Jan 16th 2017

You will learn to extend your knowledge of making iOS apps so that they can securely interact with web services and receive push notifications. You'll learn how to store data securely on a device using Core Data. You’ll also learn to securely deploy apps to the App Store and beta users over-the-air.

Average: 9 (5 votes)
Jan 16th 2017

本课程重点讲述计算机的内部结构和工作原理,着眼于软件和硬件的衔接互动,注重基本概念和真实系统的对应。

No votes yet
Jan 16th 2017

Welcome to “Cybersecurity and the Internet of Things”! This course is for you if you are curious about the most recent trends and activities in the internet capabilities and concerns about programmed devices. There are complexities and areas of necessary awareness when the industrial sector becomes connected to your home.

Average: 2 (2 votes)
Jan 16th 2017

In this course, we will explore several technologies that bring modern devices together, facilitating a network of connected things and making devices internet enabled. We will discuss rules, protocols, and standards for these devices to communicate with each other in the network. We will also go through security and privacy issues and challenges in cyber physical systems (CPS). We will explore measures and techniques for securing systems from different perspectives. Possible attack models are introduced and solutions to tackle such attacks are discussed. Moreover, some basic concepts related to privacy in cyber physical systems are presented.

Average: 8 (2 votes)
Jan 16th 2017

The Raspberry Pi is a small, affordable single-board computer that you will use to design and develop fun and practical IoT devices while learning programming and computer hardware.

Average: 7.8 (12 votes)

Pages