Customize your search:

E.g., 2017-01-17
E.g., 2017-01-17
E.g., 2017-01-17
Jan 23rd 2017

This course is for you if you are interested in transitioning toward a managerial role in cybersecurity and mobility. Through interviews with industry experts in this area, you will learn about innovations powering the rapid spread of information technology and how they present new challenges for protecting data.

Average: 4.5 (4 votes)
Jan 23rd 2017

This course will introduce you to the foundations of modern cryptography, with an eye toward practical applications.

Average: 6 (10 votes)
Jan 23rd 2017

What is the X-Factor? In Cybersecurity, the X-Factor related to unknown and unpredictable human behavior within and outside of your organization. “No one really knows why humans do what they do”, (David K. Reynolds), and because of this organizations can be unprepared for malicious, untrained, or even best intentioned behavior that can cause alarm and sometimes irreparable harm.

Average: 8 (3 votes)
Jan 23rd 2017

The impact of technology and networks on our lives, culture, and society continues to increase. The very fact that you can take this course from anywhere in the world requires a technological infrastructure that was designed, engineered, and built over the past sixty years. To function in an information-centric world, we need to understand the workings of network technology. This course will open up the Internet and show you how it was created, who created it and how it works. Along the way we will meet many of the innovators who developed the Internet and Web technologies that we use today.

Average: 7.7 (9 votes)
Jan 23rd 2017

Cryptography is an indispensable tool for protecting information in computer systems. In this course you will learn the inner workings of cryptographic systems and how to correctly use them in real-world applications. The course begins with a detailed discussion of how two parties who have a shared secret key can communicate securely when a powerful adversary eavesdrops and tampers with traffic.

Average: 5.3 (12 votes)
Jan 23rd 2017

In this course, you'll learn what every citizen should know about the security risks--and future potential — of electronic voting and Internet voting. We'll take a look at the past, present, and future of election technologies and explore the various spaces intersected by voting, including computer security, human factors, public policy, and more.

No votes yet
Jan 23rd 2017

This course uses the lives, ideals and achievements of Theodore, Franklin, and Eleanor Roosevelt to create the idea of a Rooseveltian century. It is about doing research, analyzing primary sources, and connecting all this information with a coherent and logical interpretation. It is an invitation to think critically and historically, and it wants to give you a glimpse of what it means to be a historian at work.

Average: 9.8 (4 votes)
Jan 16th 2017

In this course, we will explore several technologies that bring modern devices together, facilitating a network of connected things and making devices internet enabled. We will discuss rules, protocols, and standards for these devices to communicate with each other in the network. We will also go through security and privacy issues and challenges in cyber physical systems (CPS). We will explore measures and techniques for securing systems from different perspectives. Possible attack models are introduced and solutions to tackle such attacks are discussed. Moreover, some basic concepts related to privacy in cyber physical systems are presented.

Average: 8 (2 votes)
Jan 16th 2017

Welcome to “Cybersecurity and the Internet of Things”! This course is for you if you are curious about the most recent trends and activities in the internet capabilities and concerns about programmed devices. There are complexities and areas of necessary awareness when the industrial sector becomes connected to your home.

Average: 2 (2 votes)
Jan 16th 2017

In this course, we will study security and trust from the hardware perspective. Upon completing the course, students will understand the vulnerabilities in current digital system design flow and the physical attacks to these systems. They will learn that security starts from hardware design and be familiar with the tools and skills to build secure and trusted hardware.

Average: 4.3 (7 votes)
Jan 16th 2017

You will learn to extend your knowledge of making iOS apps so that they can securely interact with web services and receive push notifications. You'll learn how to store data securely on a device using Core Data. You’ll also learn to securely deploy apps to the App Store and beta users over-the-air.

Average: 8.8 (4 votes)
Jan 9th 2017

This course we will explore the foundations of software security. We will consider important software vulnerabilities and attacks that exploit them -- such as buffer overflows, SQL injection, and session hijacking -- and we will consider defenses that prevent or mitigate these attacks, including advanced testing and program analysis techniques. Importantly, we take a "build security in" mentality, considering techniques at each phase of the development cycle that can be used to strengthen the security of software systems.

Average: 3.3 (7 votes)
Jan 9th 2017

This course focuses on how to design and build secure systems with a human-centric focus. We will look at basic principles of human-computer interaction, and apply these insights to the design of secure systems with the goal of developing security measures that respect human performance and their goals within a system.

Average: 5.8 (8 votes)
Jan 9th 2017

This course gives an introduction into the field of terrorism & counterterrorism studies. It will help you to analyze and understand these complex phenomena and discuss its impact on society with a global audience. Students, policy makers, journalists or anyone with a strong interest in understanding issues like the history, origins and nature of terrorism, security, fear management, resilience, politics, violence, foreign fighters and radicalization will find the course most relevant.

Average: 9 (12 votes)
Jan 9th 2017

Find out how climate change will affect us, why we should care about it, and what solutions we can employ. Climate change is the biggest global challenge the human race has ever faced. Our insatiable demand for energy from fossil fuels is changing the atmosphere, and in turn changing our climate. Climate change is already affecting the physical surface of the earth, the environment that provides our life support, our food supply, economy and society. These changes will accelerate over the next few decades
In this subject you will explore the impacts of climate change; why we should care about them, the science that underpins our understanding and how we can fix the problem before it’s too late.

Average: 8.6 (10 votes)
Jan 9th 2017

Our lives depend on online services. Gain essential cyber security knowledge and skills, to help protect your digital life. We shop online. We work online. We play online. We live online. As our lives increasingly depend on digital services, the need to protect our information from being maliciously disrupted or misused is really important.

Average: 6.5 (22 votes)
Jan 4th 2017

C’est parti pour la deuxième session du MOOC « Soyez acteur de la sécurité de l’information » avec plus de saynètes, une actualisation du contenu existant et toujours plus de conseils. Les problèmes de sécurité informatique, les fuites d’informations, largement relayés par les médias lorsqu’ils sont spectaculaires ou qu’ils concernent des entreprises sensibles, sont très souvent provoqués en amont par des imprudences, des mauvais comportements d’utilisateurs dus aux méconnaissances des risques. C’est l’objectif de ce MOOC d’être capable d’appréhender les risques et de connaître les conséquences de l’usage et de la diffusion des données, d’acquérir les bons gestes et les bons réflexes pour protéger l’information.

Average: 3.5 (2 votes)
Jan 2nd 2017

Get an introduction to mobile app security and learn how to develop secure Android applications, with this free online course. 84% of security breaches are at the application layer, according to Gartner research. With mobile devices and their applications holding more and more sensitive data – from people’s locations to their personal information and financial data – ensuring that they are secure is essential, if people and companies are to trust them, and prevent the reputational and legal damage of a data breach.

Average: 7 (1 vote)
Dec 19th 2016

This course deals with international relations, peace and security and brings together a number of experts from the field and academia to share their perspectives. The course will help you gain insight into conflict resolution and the role organizations such as the United Nations Security Council, the European Union, the African Union and NATO play in a changing world.

Average: 7.6 (5 votes)
Nov 8th 2016

Learn how to use MongoDB's native and third-party integration security features and resources. This course will provide you with the knowledge to create secured deployments of MongoDB for production-ready environments.

Average: 5 (3 votes)