Computer Science > > Computer Security and Networks

计算机组成 Computer Organization

本课程重点讲述计算机的内部结构和工作原理,着眼于软件和硬件的衔接互动,注重基本概念和真实系统的对应。

The Foundations of Cybersecurity

In order to manage the cybersecurity function business, you must first understand its language and i...

Systems and Application Security

Welcome to Systems and Application Security Course! In the Systems and Application Security Course,...

Smart Contracts

This second course of the Blockchain specialization will help you design, code, deploy and execute a...

Site Reliability Engineering: Measuring and Managing Reliability

Service level indicators (SLIs) and service level objectives (SLOs) are fundamental tools for measur...

Securing Digital Democracy

In this course, you'll learn what every citizen should know about the security risks--and future pot...

Planning for a Google Workspace Deployment

Planning for a Google Workspace Deployment is the final course in the Google Workspace Administratio...

Penetration Testing, Incident Response and Forensics

This course gives you the background needed to gain Cybersecurity skills as part of the Cybersecurit...

Palo Alto Networks Cybersecurity Foundation

Palo Alto Networks Cybersecurity Foundation Course Description: In this course, students will learn...

Networks and Communications Security

Welcome to Networks and Communications Security Course! In the Networks and Communications Security...

Managing Google Workspace

Managing Google Workspace is the second course in the Google Workspace Administration series. This c...

Linux Fundamentals

This course is the first of a series that aims to prepare you for a role working as an information t...

Introduction to High-Performance and Parallel Computing

This course introduces the fundamentals of high-performance and parallel computing. It is targeted t...

Introduction to Google Workspace Administration

Introduction to Google Workspace Administration is the first course in the Google Workspace Administ...

Introduction to Cyber Attacks

This course provides learners with a baseline understanding of common cyber security threats, vulner...

Introduction to Blockchain for Financial Services

In this first course of the specialization, we will discuss the limitations of the Internet for busi...

Introduction to Blockchain Technologies

In this first course of the specialization, we will discuss the limitations of the Internet for busi...

Information Systems Auditing, Controls and Assurance

The course is awarded The Best Free Online Courses of All Time, and Best Online Courses of the Year...

Information Security: Context and Introduction

In this course you will explore information security through some introductory material and gain an...

Identifying, Monitoring, and Analyzing Risk and Incident Response and Recovery

Risk Identification, Monitoring, and Analysis: In the Risk Identification, Monitoring, and Analysis...