Back to Courses

Computer Security And Networks Courses - Page 8

Showing results 71-80 of 277
Cybersecurity Policy for Aviation and Internet Infrastructures
In this course we will examine the aviation and Internet infrastructures, and various policies that have been developed to help guide and strengthen their cybersecurity programs. The aviation and Internet infrastructures are also considered "lifeline infrastructure" as part of the transportation and communications sectors. Both subsectors are overseen by the Department of Homeland Security National Protection and Programs Directorate which manages the DHS National Infrastructure Protection Program. SSA responsibility for the aviation subsector is shared between the Transportation Security Administration and Federal Aviation Administration under the auspices of the Department of Homeland Security and Department of Transportation respectively. The Department of Homeland Security retains sole responsibility as the Sector-Specific Agency for the Internet subsector. While TSA and FAA have regulatory over the aviation subsector, DHS has no regulatory authority whatsoever over the Internet. In response to Executive Order 13636 issued by President Obama in February 2013, both sets of SSAs recommended continuing with voluntary cybersecurity measures. TSA and FAA reported they were working to implement the Transportation Roadmap across all transportation subsectors, including aviation. DHS reported that it was working with Internet providers to implement the Cyber Assessment Risk Management Approach. Despite some differences, the Transportation Roadmap and CARMA are very similar to the NIST Cybersecrity Framework and ES-C2M2 examined previously. That is to say, they are predicated on a continuous improvement process that engages the whole organization in identifying and implementing incremental changes to enhance cybersecurity practices based on prevailing standards. This module will examine both the aviation and Internet lifeline infrastructure subsectors, and elements and application of the Transportation Roadmap and CARMA.
Homeland Security and Cybersecurity Future
This course takes a look at the future of cybersecurity with respect to what is being done to lessen the potential for catastrophic destruction resulting from cyber attack on critical infrastructure. In this respect, we take a short survey of potential technological solutions and response options. We conclude this module by taking a look at unique aspects of the cyber profession and personal considerations for those who want to make cybersecurity a career.
Building Virtual Agent Fulfillment
This is a self-paced lab that takes place in the Google Cloud console. In this lab, you will continue working on your Pigeon Travel chat agent and add context as well as setup fulfillment to lookup and store reservations entries in Firestore.
Secure Networked System with Firewall and IDS
In this MOOC, we will focus on learning how network systems are secured using firewalls and IDS. This will include understanding the basic components of network security, constructing a dual-firewall DMZ, and defining security policies to implement and enforce these rules. Building upon these lessons we will go in-depth on the popular Linux firewall. Finally we will learn about Network IDS and Host IDS, including a deep dive into Snort.
Dialogflow CX: Bot Building Basics
This is a self-paced lab that takes place in the Google Cloud console. Build a conversational agent using Dialogflow CX. Dialogflow CX provides a simple, visual bot building approach to virtual agent design. Bot designers now have a much clearer picture of the overall bot building process and multiple designers are able to easily collaborate on the same agent build. Dialogflow CX supports many languages for your agent to use and understand, but this lab will be using only English. In this lab you will build a conversational agent using Dialogflow CX.
Architecting Smart IoT Devices
This course will teach you how to develop an embedded systems device. In order to reduce the time to market, many pre-made hardware and software components are available today. You'll discover all the available hardware and software components, such as processor families, operating systems, boards, and networks. You'll also learn how to actually use and integrate these components. At the end of the course, you will be ready to start architecting and implementing your own embedded device! You'll learn how to debug and finetune your device and how to make it run on a low power supply.
Linux: SSH to remote server & Networking basics for DevOps
By the end of this course, you will have a solid grasp of SSH and authenticating users and client machines to a server. You will further have a working knowledge of some of the most important Networking concepts and commands in Linux.
Blockchain Transformations of Financial Services
The current global financial system is riddled with inefficiencies, uneven developments, and bizarre contradictions. Blockchain technology has the potential to bring about profound changes to financial services. In this course, you will learn how blockchain technology will disrupt the core functions of the financial services industry, offering individuals and organizations alike real choices in how they create and manage value.
API Gateway: Qwik Start
This is a self-paced lab that takes place in the Google Cloud console. API Gateway enables you to provide secure access to your services through a well-defined REST API that is consistent across all of your services, regardless of service implementation. In this lab, you will deploy an API on API Gateway to secure traffic to a backend service.
Introduction to the Juniper Contrail Networking Solution
This course will introduce you to Juniper Networks Contrail Networking (CN2) , a cloud-native SDN solution for intelligent networking and security for Telco and IT cloud. You will learn about the concepts of a virtual network, underlays and overlays, as well as tunneling protocols such as VXLAN. The course will explore Network Functions Virtualization (NFV) and software-defined networking (SDN) approaches. You will learn about cloud-native Contrail Networking architecture and integration with orchestrations systems such as Kubernetes. Navigating the Contrail user interface and Contrail’s advanced networking features to create Kubernetes custom networks and multi-interface Pods will also be explored.