Networks

Sort options

Posicionamiento en redes: estrategias de contenido. (Coursera)

May 30th 2022
Posicionamiento en redes: estrategias de contenido. (Coursera)
Course Auditing
Categories
Effort
Languages
Este curso está dirigido no solo a los profesionales de los medios de comunicación sino también a cualquier personal interesada en conocer las redes sociales, diferenciarlas, utilizar herramientas para generar contenido para las redes sociales y evitar errores en su generación, sin importar la edad o el nivel [...]

Redes Ecológicas (Coursera)

Todos os seres vivos estão conectados entre si por interações ecológicas, formando a “colina emaranhada” de Darwin, metáfora inspirada pela “teia da vida” de Humboldt. Desemaranhar essa complexidade é uma tarefa desafiadora, mas factível, desde que você use ferramentas adequadas. A ciência de redes nos ajuda com excelentes ferramentas [...]

Os vários elementos das redes informáticas (Coursera)

Este curso foi concebido para proporcionar uma vista geral das redes informáticas. Vamos abordar desde os princípios básicos das tecnologias e protocolos de redes modernos até aplicações práticas e resolução de problemas de rede. Para terminar, vamos abordar o modo como estas informações podem surgir numa entrevista de emprego [...]

Introduction to High-Performance and Parallel Computing (Coursera)

This course introduces the fundamentals of high-performance and parallel computing. It is targeted to scientists, engineers, scholars, really everyone seeking to develop the software skills necessary for work in parallel software environments. These skills include big-data analysis, machine learning, parallel programming, and optimization. We will cover the basics of [...]

Migrating to Google Cloud (Coursera)

May 30th 2022
Migrating to Google Cloud (Coursera)
Course Auditing
Categories
Effort
Languages
This course introduces participants to the strategies to migrate from a source environment to Google Cloud. Participants are introduced to Google Cloud's fundamental concepts and more in depth topics, like creating virtual machines, configuring networks and managing access and identities. The course then covers the installation and migration process [...]

IT Security: Defense against the digital dark arts (Coursera)

This course covers a wide variety of IT security concepts, tools, and best practices. It introduces threats and attacks and the many ways they can show up. We’ll give you some background of encryption algorithms and how they’re used to safeguard data. Then, we’ll dive into the three As [...]

Cryptography and Information Theory (Coursera)

This course combines cryptography (the techniques for protecting information from unauthorized access) and information theory (the study of information coding and transfer). More specifically, the course studies cryptography from the information-theoretical perspectives and discuss the concepts such as entropy and the attacker knowledge capabilities, e.g., Kerckhoff's Principle. It also [...]

Asymmetric Cryptography and Key Management (Coursera)

In asymmetric cryptography or public-key cryptography, the sender and the receiver use a pair of public-private keys, as opposed to the same symmetric key, and therefore their cryptographic operations are asymmetric. This course will first review the principles of asymmetric cryptography and describe how the use of the pair [...]

Classical Cryptosystems and Core Concepts (Coursera)

Welcome to Introduction to Applied Cryptography. Cryptography is an essential component of cybersecurity. The need to protect sensitive information and ensure the integrity of industrial control processes has placed a premium on cybersecurity skills in today’s information technology market. Demand for cybersecurity jobs is expected to rise 6 [...]

TCP/IP and Advanced Topics (Coursera)

In this course, we give an in-depth study of the TCP/IP protocols. We examine the details of how IP enables communications across a collection of networks. We pay particular attention to the hierarchical structure of IP addresses and explain their role in ensuring scalability of the Internet. The role [...]