Computer Science > > Computer Security and Networks

计算机组成 Computer Organization

本课程重点讲述计算机的内部结构和工作原理,着眼于软件和硬件的衔接互动,注重基本概念和真实系统的对应。

University/Institute: Peking University

Details Take This Course

The Foundations of Cybersecurity

In order to manage the cybersecurity function business, you must first understand its language and i...

University/Institute: University System of Georgia

Details Take This Course

Systems and Application Security

Welcome to Systems and Application Security Course! In the Systems and Application Security Course,...

University/Institute: (ISC)²

Details Take This Course

Smart Contracts

This second course of the Blockchain specialization will help you design, code, deploy and execute a...

University/Institute: The State University of New York

Details Take This Course

Site Reliability Engineering: Measuring and Managing Reliability

Service level indicators (SLIs) and service level objectives (SLOs) are fundamental tools for measur...

University/Institute: Google Cloud

Details Take This Course

Securing Digital Democracy

In this course, you'll learn what every citizen should know about the security risks--and future pot...

University/Institute: University of Michigan

Details Take This Course

Planning for a Google Workspace Deployment

Planning for a Google Workspace Deployment is the final course in the Google Workspace Administratio...

University/Institute: Google Cloud

Details Take This Course

Penetration Testing, Incident Response and Forensics

This course gives you the background needed to gain Cybersecurity skills as part of the Cybersecurit...

University/Institute: IBM

Details Take This Course

Palo Alto Networks Cybersecurity Foundation

Palo Alto Networks Cybersecurity Foundation Course Description: In this course, students will learn...

University/Institute: Palo Alto Networks

Details Take This Course

Networks and Communications Security

Welcome to Networks and Communications Security Course! In the Networks and Communications Security...

University/Institute: (ISC)²

Details Take This Course

Managing Google Workspace

Managing Google Workspace is the second course in the Google Workspace Administration series. This c...

University/Institute: Google Cloud

Details Take This Course

Linux Fundamentals

This course is the first of a series that aims to prepare you for a role working as an information t...

University/Institute: LearnQuest

Details Take This Course

Introduction to High-Performance and Parallel Computing

This course introduces the fundamentals of high-performance and parallel computing. It is targeted t...

University/Institute: University of Colorado Boulder

Details Take This Course

Introduction to Google Workspace Administration

Introduction to Google Workspace Administration is the first course in the Google Workspace Administ...

University/Institute: Google Cloud

Details Take This Course

Introduction to Cyber Attacks

This course provides learners with a baseline understanding of common cyber security threats, vulner...

University/Institute: New York University

Details Take This Course

Introduction to Blockchain for Financial Services

In this first course of the specialization, we will discuss the limitations of the Internet for busi...

University/Institute: INSEAD

Details Take This Course

Introduction to Blockchain Technologies

In this first course of the specialization, we will discuss the limitations of the Internet for busi...

University/Institute: INSEAD

Details Take This Course

Information Systems Auditing, Controls and Assurance

The course is awarded The Best Free Online Courses of All Time, and Best Online Courses of the Year...

University/Institute: The Hong Kong University of Science and Technology

Details Take This Course

Information Security: Context and Introduction

In this course you will explore information security through some introductory material and gain an...

University/Institute: University of London

Details Take This Course

Identifying, Monitoring, and Analyzing Risk and Incident Response and Recovery

Risk Identification, Monitoring, and Analysis: In the Risk Identification, Monitoring, and Analysis...

University/Institute: (ISC)²

Details Take This Course