Computer Security

Sort options

Cybersecurity Fundamentals (edX)

Learn cybersecurity fundamentals, including how to detect threats, protect systems and networks, and anticipate potential cyber attacks. In this introduction to the field of computing security, you will be given an extensive overview of the various branches of computing security. You will learn cybersecurity concepts, issues, and tools that [...]
3
Average: 3 ( 3 votes )

Introduction to High-Performance and Parallel Computing (Coursera)

This course introduces the fundamentals of high-performance and parallel computing. It is targeted to scientists, engineers, scholars, really everyone seeking to develop the software skills necessary for work in parallel software environments. These skills include big-data analysis, machine learning, parallel programming, and optimization. We will cover the basics of [...]
0
No votes yet

Blockchain Scalability and its Foundations in Distributed Systems (Coursera)

Blockchain promises to disrupt industries once it will be efficient at large scale. In this course, you will learn how to make blockchain scale. You will learn about the foundational problem of distributed computing, consensus, that is key to create blocks securely. By illustrating limitations of mainstream blockchains, this [...]
0
No votes yet

Google Workspace Security (Coursera)

Google Workspace Security is the third course in the Google Workspace Administration series. In this course you will focus on the various aspects of G Suite Security including user password policies and how to enable and enforce two step verification (2SV) for your users. You will learn about application [...]
0
No votes yet

Security Best Practices in Google Cloud (Coursera)

Nov 1st 2021
Security Best Practices in Google Cloud (Coursera)
Course Auditing
Categories
Effort
Languages
This self-paced training course gives participants broad study of security controls and techniques on Google Cloud Platform. Through recorded lectures, demonstrations, and hands-on labs, participants explore and deploy the components of a secure GCP solution, including Cloud Identity, the GCP Resource Manager, Cloud IAM, Google Virtual Private Cloud firewalls, [...]
0
No votes yet

Big Data Analytical Platform on Alibaba Cloud (Coursera)

Building an Analytical Platform on Alibaba Cloud can empower how you take in, analyze, and demonstrate clear metrics from a set of Big Data. This course is designed to teach engineers how to use Alibaba Cloud Big Data products. It covers basic distributed system theory and Alibaba Cloud's core [...]
0
No votes yet

Develop and Deploy Windows Applications on Google Cloud Platform (Coursera)

Nov 1st 2021
Develop and Deploy Windows Applications on Google Cloud Platform (Coursera)
Course Auditing
Categories
Effort
Languages
Learn to deploy and run Microsoft Windows® applications on Google Cloud Platform (GCP). Through lectures and hands-on labs, learn how to configure and run Microsoft Windows and Microsoft SQL Server in Google Compute Engine. You will also learn how to develop and deploy ASP.NET applications and deploy them to [...]
1
Average: 1 ( 3 votes )

Enterprise and Infrastructure Security (Coursera)

This course introduces a series of advanced and current topics in cyber security, many of which are especially relevant in modern enterprise and infrastructure settings. The basics of enterprise compliance frameworks are provided with introduction to NIST and PCI. Hybrid cloud architectures are shown to provide an opportunity to [...]
0
No votes yet

Real-Time Cyber Threat Detection and Mitigation (Coursera)

This course introduces real-time cyber security techniques and methods in the context of the TCP/IP protocol suites. Explanation of some basic TCP/IP security hacks is used to introduce the need for network security solutions such as stateless and stateful firewalls. Learners will be introduced to the techniques used [...]
0
No votes yet

Cyber Attack Countermeasures (Coursera)

This course introduces the basics of cyber defense starting with foundational models such as Bell-LaPadula and information flow frameworks. These underlying policy enforcements mechanisms help introduce basic functional protections, starting with authentication methods. Learners will be introduced to a series of different authentication solutions and protocols, including RSA SecureID [...]
4
Average: 4 ( 4 votes )