Computer Security and Networks Online Courses for Students

Found 52 listings, displaying 1-20
Filter:
Introduction to Cyber Security was designed to help learners develop a deeper understanding of modern information and system protection technology and methods. The learning outcome is simple: We hope learners will develop a lifelong passion and appreciation for cyber security, which we are...
Managing G Suite is the second course in the G Suite Administration Specialization. This course focuses on the G Suite core services such as Gmail, Calendar, and Drive & Docs. You will become familiar with the various service settings, and learn how to enable them for all or just a subset of your...
This specialization in intended for IT professionals, computer programmers, managers, IT security professionals who like to move up ladder, who are seeking to develop network system security skills. Through four courses, we will cover the Design and Analyze Secure Networked Systems, Develop...
Introduction to G Suite is the first course in the G Suite Administration Specialization. The series will serve as the starting place for any new G Suite admin as they begin their journey of managing and establishing G Suite best practices for their organization. These courses together will leave...
Welcome to the Cloud Computing Applications course, the first part of a two-course series designed to give you a comprehensive view on the world of Cloud Computing and Big Data! In this first course we cover a multitude of technologies that comprise the modern concept of cloud computing. Cloud...
Have you ever wished you knew how to program, but had no idea where to start from? This course will teach you how to program in Scratch, an easy to use visual programming language. More importantly, it will introduce you to the fundamental principles of computing and it will help you think like a...
This first course of the Blockchain specialization provides a broad overview of the essential concepts of blockchain technology - by initially exploring the Bitcoin protocol followed by the Ethereum protocol - to lay the foundation necessary for developing applications and programming. You will...
In the cloud networking course, we will see what the network needs to do to enable cloud computing. We will explore current practice by talking to leading industry experts, as well as looking into interesting new research that might shape the cloud network\'s future. This course will allow us to...
In this course you will explore information security through some introductory material and gain an appreciation of the scope and context around the subject. This includes a brief introduction to cryptography, security management and network and computer security that allows you to begin the...
This specialization is intended for the learners interested in or already pursuing a career in computer security or other cybersecurity-related fields. Through four courses, the learners will cover the security of information systems, information entropy, classical cryptographic algorithms,...
This specialization is developed for seniors and fresh graduate students to understand fundamental network architecture concepts and their impacts on cyber security, to develop skills and techniques required for network protocol design, and prepare for a future of constant change through exposure...
The Computer Security and Systems Management Specialization focuses on computing in an enterprise environment. Combining both theory and real world experience and architecture, the courses will prepare you to design and audit secure enterprise systems. The courses will cover practical use of...
The Cybersecurity Specialization covers the fundamental concepts underlying the construction of secure systems, from the hardware to the software to the human-computer interface, with the use of cryptography to secure interactions. These concepts are illustrated with examples drawn from modern...
It seems anymore that you can\'t listen to the news without hearing of a data breach. You may have heard it said before that there are 2 types of companies out there, the ones who have been breached and those who will be breached. Defending against attackers who want to compromise assets can seem...
Three people died after the crash landing of an Asiana Airlines aircraft from Seoul, Korea, at San Fransisco International Airport (SFO) on July 6, 2013. The American National Transportation Safety Board (NTSB) established that the crash most probably was caused by the flight crew\'s (in)actions...
This five-course certificate, developed by Google, includes innovative curriculum designed to prepare you for an entry-level role in IT support. A job in IT can mean in-person or remote help desk work in a small business or at a global company like Google. If you\'ve been tinkering with IT or are...
The Palo Alto Networks Cybersecurity Specialization prepares students for entry level careers in cybersecurity, with an emphasis on administering the Palo Alto Networks Next Generation Firewall. All courses also map learning objectives to the U.S. NIST/NICE framework and cybersecurity work roles...
Parallel, concurrent, and distributed programming underlies software in multiple domains, ranging from biomedical research to financial services. This specialization is intended for anyone with a basic knowledge of sequential programming in Java, who is motivated to learn how to write parallel,...
This fourth course of the Blockchain specialization provides learners with an understanding of the broader blockchain ecosystem. Learners are introduced to other blockchain platforms, details of two decentralized application use cases, and challenges such as privacy and scalability. They are...
Welcome to the Cloud Computing Applications course, the second part of a two-course series designed to give you a comprehensive view on the world of Cloud Computing and Big Data! In this second course we continue Cloud Computing Applications by exploring how the Cloud opens up data analytics of...

Computer Security and Networks Online Courses for UCLA Students

Searching for UCLA Computer Security and Networks online courses has never been quicker. Browse Computer Security and Networks online courses and more in and around Los Angeles, CA. To help narrow your results down, use Computer Security and Networks online course filters to refine your UCLA Computer Security and Networks online course search and enhance your Biology search experience. Sharing relevant Computer Security and Networks listings with UCLA classmates can really help make the search process even faster for them! Uloop.com can help you find UCLA Computer Security and Networks online courses today!

Online Courses

Back to Top

Log In

Contact Us

Upload An Image

Please select an image to upload
Note: must be in .png, .gif or .jpg format
OR
Provide URL where image can be downloaded
Note: must be in .png, .gif or .jpg format

By clicking this button,
you agree to the terms of use

By clicking "Create Alert" I agree to the Uloop Terms of Use.

Image not available.

Add a Photo

Please select a photo to upload
Note: must be in .png, .gif or .jpg format