Computer Science: Systems, Security, Networking

 

 


 


Master Computer Science on Coursera




Customize your search:

E.g., 2017-06-23
E.g., 2017-06-23
E.g., 2017-06-23
Self Paced

Trataremos la integración de los Sistemas de Información Geográfica y los dispositivos móviles para usarlos en la gestión del territorio.

Average: 6.3 (3 votes)
May 30th 2017

Learn everything you need to know to administer a MongoDB installation in production. This course begins by assuming you have no experience with MongoDB, taking you through the basics of installation. Then you will learn about JSON and Mongo's extensive query capabilities through the Mongo shell. We will cover importing, and exporting data into Mongo. After that, we cover replication and fault tolerance. Then it is on to scaling out with MongoDB, including indexing, performance tuning, monitoring, and sharding. Finally, we cover backups and recovery. No prior experience with MongoDB is assumed for this course but a knowledge of administration of another database will be helpful.

Average: 6.3 (3 votes)
May 30th 2017

Learn everything you need to know to get started building a MongoDB-based app. This course will go over basic installation, JSON, schema design, querying, insertion of data, indexing and working with the Node.js driver. In the course, you will build a blogging platform, backed by MongoDB.

Average: 4.2 (14 votes)
May 30th 2017

Learn everything you need to know to get started building a MongoDB-based app. This course will go over basic installation, JSON, schema design, querying, insertion of data, indexing and working with the Java driver. In the course, you will build a blogging platform, backed by MongoDB.

Average: 6.7 (10 votes)
May 30th 2017

Learn everything you need to know to get started building a MongoDB-based app. This course will go over basic installation, JSON, schema design, querying, insertion of data, indexing and working with the Python driver. We will also cover working in sharded and replicated environments. In the course, you will build a blogging platform, backed by MongoDB. A brief Python introduction is included in the course.

Average: 5.4 (12 votes)
May 29th 2017

This course we will explore the foundations of software security. We will consider important software vulnerabilities and attacks that exploit them -- such as buffer overflows, SQL injection, and session hijacking -- and we will consider defenses that prevent or mitigate these attacks, including advanced testing and program analysis techniques. Importantly, we take a "build security in" mentality, considering techniques at each phase of the development cycle that can be used to strengthen the security of software systems.

Average: 3.3 (7 votes)
May 29th 2017

Have you wondered how “Things” talk to each other and the cloud? Do you understand the alternatives for conveying latency-sensitive real time data versus reliable signaling data? Building on the skills from the Sensing and Actuation course, we will explore protocols to exchange information between processors. In this course, you will learn how VoIP systems like Skype work and implement your own app for voice calls and text messages.

Average: 7 (2 votes)
May 29th 2017

Welcome to the Cloud Computing Applications course, the first part of a two-course series designed to give you a comprehensive view on the world of Cloud Computing and Big Data! In this first course we cover a multitude of technologies that comprise the modern concept of cloud computing. Cloud computing is an information technology revolution that has just started to impact many enterprise computing systems in major ways, and it will change the face of computing in the years to come.

No votes yet
May 29th 2017

Embedded Systems are so ubiquitous that some of us take them for granted: we find them in smartphones, GPS systems, airplanes and so on. But have you ever wondered how these devices actually work? If so, you're in the right place! In this course, you'll learn about the characteristics of embedded systems: the possibilities, dangers, complications and recipes for success.

Average: 6.5 (2 votes)
May 29th 2017

This course covers the fundamentals of Google Cloud Platform. This course introduces you to important concepts and terminology for working with Google Cloud Platform (GCP). You learn about, and compare, many of the computing and storage services available in Google Cloud Platform, including Google App Engine, Google Compute Engine, and Google Container Engine.

Average: 8 (1 vote)
May 29th 2017

What is the X-Factor? In Cybersecurity, the X-Factor related to unknown and unpredictable human behavior within and outside of your organization. “No one really knows why humans do what they do”, (David K. Reynolds), and because of this organizations can be unprepared for malicious, untrained, or even best intentioned behavior that can cause alarm and sometimes irreparable harm.

Average: 7.4 (5 votes)
May 29th 2017

This course is for you if you are interested in transitioning toward a managerial role in cybersecurity and mobility. Through interviews with industry experts in this area, you will learn about innovations powering the rapid spread of information technology and how they present new challenges for protecting data.

Average: 5.4 (7 votes)
May 29th 2017

In this course you will explore information security through some introductory material and gain an appreciation of the scope and context around the subject. This includes a brief introduction to cryptography, security management and network and computer security that allows you to begin the journey into the study of information security and develop your appreciation of some key information security concepts.

No votes yet
May 29th 2017

This course focuses on how to design and build secure systems with a human-centric focus. We will look at basic principles of human-computer interaction, and apply these insights to the design of secure systems with the goal of developing security measures that respect human performance and their goals within a system.

Average: 5.8 (8 votes)
May 23rd 2017

Explore the tradeoffs in designing communication systems like mobile phones, and the engineering tools to handle them.

Average: 3 (3 votes)
May 23rd 2017

Learn cybersecurity fundamentals, including how to detect threats, protect systems and networks, and anticipate potential cyber attacks. In this introduction to the field of computing security, you will be given an extensive overview of the various branches of computing security. You will learn cybersecurity concepts, issues, and tools that are critical in solving problems in the computing security domain.

No votes yet
May 23rd 2017

Learn how to optimize the performance of your MongoDB deployment. This course will cover how to use best practices for achieving performance at scale in a MongoDB system.

Average: 3 (2 votes)
May 23rd 2017

Learn how to use MongoDB's native and third-party integration security features and resources. This course will provide you with the knowledge to create secured deployments of MongoDB for production-ready environments.

Average: 6.4 (5 votes)
May 23rd 2017

Learn how to diagnose and debug issues that can arise in your MongoDB deployment. This course will go over a set of scenarios you might find in production, and introduce you to many of the tools and functionality that MongoDB's support and field teams use to diagnose issues, and how to fix those problems once they're identified.

No votes yet
May 23rd 2017

Learn the process, techniques and tools for performing a digital forensics investigation to obtain data related to computer crimes. Digital forensics involves the investigation of computer-related crimes with the goal of obtaining evidence to be presented in a court of law.

No votes yet

Pages