Back to Courses

Computer Security And Networks Courses - Page 7

Showing results 61-70 of 277
Advanced System Security Topics
In this MOOC, we learn RBAC and ABAC access control to facilitate the specification and management of access policies. We learn examples of how RBAC is supported by modern systems such as Docker and AWS IAM. We learn XACML 3.0 and an ABAC implementation for controling secure access to web documents and network resources with attribute certificates, and XACML architecture components. We show how to exhance the data security with GeoEncryption, Secure Enhanced Geolocking, and R2D2 concepts which deliver data to right places via right path. We show how Google Map and Web Crytpo API can be integrated for encrypted document on web browser without download apps and associate them with geolocking area to restrict unauthorize and improper accesses.
Juniper Cloud Concepts and Open Source Technologies
In this course, you will learn fundamental cloud computing concepts. This course covers key benefits of cloud computing, cloud service models such as SaaS and IaaS; public, private and hybrid cloud deployment models and open-source cloud technologies. You will learn about Linux virtualization techniques, QEMU-KVM, Libvirt and popular cloud instance initialization approach cloud-init. This course covers the concepts of namespaces and how to connect them through Linux bridges and OpenvSwitch. You will also learn about containerization through Docker, Dockerfile and Docker networking.
Cybersecurity Policy for Aviation and Internet Infrastructures
In this course we will examine the aviation and Internet infrastructures, and various policies that have been developed to help guide and strengthen their cybersecurity programs. The aviation and Internet infrastructures are also considered "lifeline infrastructure" as part of the transportation and communications sectors. Both subsectors are overseen by the Department of Homeland Security National Protection and Programs Directorate which manages the DHS National Infrastructure Protection Program. SSA responsibility for the aviation subsector is shared between the Transportation Security Administration and Federal Aviation Administration under the auspices of the Department of Homeland Security and Department of Transportation respectively. The Department of Homeland Security retains sole responsibility as the Sector-Specific Agency for the Internet subsector. While TSA and FAA have regulatory over the aviation subsector, DHS has no regulatory authority whatsoever over the Internet. In response to Executive Order 13636 issued by President Obama in February 2013, both sets of SSAs recommended continuing with voluntary cybersecurity measures. TSA and FAA reported they were working to implement the Transportation Roadmap across all transportation subsectors, including aviation. DHS reported that it was working with Internet providers to implement the Cyber Assessment Risk Management Approach. Despite some differences, the Transportation Roadmap and CARMA are very similar to the NIST Cybersecrity Framework and ES-C2M2 examined previously. That is to say, they are predicated on a continuous improvement process that engages the whole organization in identifying and implementing incremental changes to enhance cybersecurity practices based on prevailing standards. This module will examine both the aviation and Internet lifeline infrastructure subsectors, and elements and application of the Transportation Roadmap and CARMA.
Homeland Security and Cybersecurity Future
This course takes a look at the future of cybersecurity with respect to what is being done to lessen the potential for catastrophic destruction resulting from cyber attack on critical infrastructure. In this respect, we take a short survey of potential technological solutions and response options. We conclude this module by taking a look at unique aspects of the cyber profession and personal considerations for those who want to make cybersecurity a career.
Building Virtual Agent Fulfillment
This is a self-paced lab that takes place in the Google Cloud console. In this lab, you will continue working on your Pigeon Travel chat agent and add context as well as setup fulfillment to lookup and store reservations entries in Firestore.
Secure Networked System with Firewall and IDS
In this MOOC, we will focus on learning how network systems are secured using firewalls and IDS. This will include understanding the basic components of network security, constructing a dual-firewall DMZ, and defining security policies to implement and enforce these rules. Building upon these lessons we will go in-depth on the popular Linux firewall. Finally we will learn about Network IDS and Host IDS, including a deep dive into Snort.
Technical Support Case Studies and Capstone
This course allows you to show what you’ve learned in the previous IT Technical Support professional certification courses and apply that knowledge to realistic situations. The IT Technical Support Capstone leads you through a series of technical support case studies that require hands-on work to resolve. You will practice analyzing user help requests and troubleshooting various issues. You’ll demonstrate your knowledge of hardware, software, networking, security, and cloud computing. You’ll also demonstrate your understanding of escalation, levels of support, ticketing systems, and other support tools and systems. And along the way, you’ll show what you’ve learned about the essential communication and customer service skills for effective technical support. By the end of the course, you will better understand how to use your technical support skills in everyday professional settings. You’ll also be prepared to take the CompTIA ITF+ exam for certification.
Dialogflow CX: Bot Building Basics
This is a self-paced lab that takes place in the Google Cloud console. Build a conversational agent using Dialogflow CX. Dialogflow CX provides a simple, visual bot building approach to virtual agent design. Bot designers now have a much clearer picture of the overall bot building process and multiple designers are able to easily collaborate on the same agent build. Dialogflow CX supports many languages for your agent to use and understand, but this lab will be using only English. In this lab you will build a conversational agent using Dialogflow CX.
Develop and Deploy Windows Applications on Google Cloud
Learn to deploy and run Microsoft Windows® applications on Google Cloud. Through lectures and hands-on labs, learn how to configure and run Microsoft Windows and Microsoft SQL Server in Compute Engine. You will also learn how to develop and deploy ASP.NET applications and deploy them to Compute Engine, App Engine, and Google Kubernetes Engine.
Data Encryption using AWS KMS From UST
Welcome to this Guided Project on Data Encryption using AWS KMS, From UST. For more than 20 years, UST has worked side by side with the world’s best companies to make a real impact through transformation. Powered by technology, inspired by people and led by their purpose, they partner with clients from design to operation. With this Guided Project from UST, you can quickly build in-demand job skills and expand your career opportunities in the Securities field by learning how to use AWS KMS for Cryptographic Operations. Join me as we explore different approaches to the Encryption / Decryption Process and learn how to create Symmetric and Asymmetric Customer Keys. Combining detailed explanations with practical experience, by the end of this project, you will be able to Encrypt/ Decrypt your sensitive data using the regional service, AWS KMS (Key Management Service). If you dream about working in high profile industry jobs as a Data Security specialist, this project is a great place to start. This is a beginner level project, and does not require any previous experience. Enroll now to get started!