Security

 

 


 

Customize your search:

E.g., 2017-09-20
E.g., 2017-09-20
E.g., 2017-09-20
Sep 26th 2017

Learn key principles of risk analysis, risk assessment and risk mitigation for information security using both qualitative and quantitative methodologies. Cybersecurity risk management guides a growing number of IT decisions. Cybersecurity risks continue to have critical impacts on overall IT risk modeling, assessment and mitigation.

Average: 6.3 (3 votes)
Sep 25th 2017

In this course, we will study security and trust from the hardware perspective. Upon completing the course, students will understand the vulnerabilities in current digital system design flow and the physical attacks to these systems. They will learn that security starts from hardware design and be familiar with the tools and skills to build secure and trusted hardware.

Average: 4 (8 votes)
Sep 25th 2017

Welcome to “Cybersecurity and the Internet of Things”! This course is for you if you are curious about the most recent trends and activities in the internet capabilities and concerns about programmed devices. There are complexities and areas of necessary awareness when the industrial sector becomes connected to your home.

Average: 5 (5 votes)

Sep 25th 2017

Les interventions du maire en matière de police, doivent respecter certains principes. Ce MOOC intitulé « Les pouvoirs de police du maire », a pour objet de présenter, de façon didactique, les principes d’exercice et d’application du pouvoir de police du maire, et les liens qu’il est nécessaire de créer pour garantir une cohérence entre décisions et exécution des mesures de police.

No votes yet
Sep 25th 2017

In this course, we will explore several technologies that bring modern devices together, facilitating a network of connected things and making devices internet enabled. We will discuss rules, protocols, and standards for these devices to communicate with each other in the network. We will also go through security and privacy issues and challenges in cyber physical systems (CPS). We will explore measures and techniques for securing systems from different perspectives. Possible attack models are introduced and solutions to tackle such attacks are discussed. Moreover, some basic concepts related to privacy in cyber physical systems are presented.

Average: 8.7 (3 votes)
Sep 25th 2017

You will learn to extend your knowledge of making iOS apps so that they can securely interact with web services and receive push notifications. You'll learn how to store data securely on a device using Core Data. You’ll also learn to securely deploy apps to the App Store and beta users over-the-air.

Average: 8 (7 votes)

Sep 25th 2017

In this course, we give an in-depth study of the TCP/IP protocols. We examine the details of how IP enables communications across a collection of networks. We pay particular attention to the hierarchical structure of IP addresses and explain their role in ensuring scalability of the Internet. The role of address prefixes and the uses of masks are explained in details.

No votes yet
Sep 19th 2017

Learn how to use MongoDB's native and third-party integration security features and resources. This course will provide you with the knowledge to create secured deployments of MongoDB for production-ready environments.

Average: 6.3 (6 votes)
Sep 18th 2017

Welcome to Course 1 in CS4950, Homeland Security and Cybersecruity. In this course we examine the origins of homeland security and its co0nnection with cybersecurity. Homeland security is about safeguarding the United States from domestic catastrophic destruction. Catastrophic destruction comes in two forms: natural and manmade.

Average: 7 (1 vote)
Sep 18th 2017

This course takes a look at the future of cybersecurity with respect to what is being done to lessen the potential for catastrophic destruction resulting from cyber attack on critical infrastructure. In this respect, we take a short survey of potential technological solutions and response options. We conclude this module by taking a look at unique aspects of the cyber profession and personal considerations for those who want to make cybersecurity a career.

Average: 5.5 (2 votes)
Sep 18th 2017

G Suite Administrator Fundamentals serves as the starting place for any new G Suite admin as they begin their journey of managing and establishing G Suite best practices for their organization. This 15-30 hour accelerated one week course will leave you feeling confident to utilize the basic functions of the Admin Console to manage users, control access to services, configure common security settings, and much more.

Average: 6 (2 votes)

Sep 18th 2017

This course is for you if you are interested in transitioning toward a managerial role in cybersecurity and mobility. Through interviews with industry experts in this area, you will learn about innovations powering the rapid spread of information technology and how they present new challenges for protecting data.

Average: 5.5 (8 votes)