

دوراتنا

Advanced System Security Design
This specialization is intended for intermediate level learners with basic programming skills and basic cybersecurity knowledge. Through this course learner will learn about advanced secure software techniques such as those for cloud computing, TOR, web-based cryptography, and geo-location/context based access control.
-
Course by
-
Self Paced
-
الإنجليزية

Asymmetric Cryptography and Key Management
Welcome to Asymmetric Cryptography and Key Management! In asymmetric cryptography or public-key cryptography, the sender and the receiver use a pair of public-private keys, as opposed to the same symmetric key, and therefore their cryptographic operations are asymmetric. This course will first review the principles of asymmetric cryptography and describe how the use of the pair of keys can provide different security properties.
-
Course by
-
Self Paced
-
9 ساعات
-
الإنجليزية

Web3 and Blockchain Transformations in Global Supply Chains
The global supply chain is a $50 trillion industry and is the foundation of our global economy. While information technology has improved the flow of goods globally over the last few decades, as the COVID-19 crisis revealed there is still critical work to do. Today’s supply chains are complex, with parties conducting their transactions through a Byzantine network of computer systems with disparate applications like e-mail, phone, and fax. There are invoices, letters of credit, bank guarantees, bills of lading, tax forms, receipts, and other paperwork moving through this complex labyrinth.
-
Course by
-
Self Paced
-
13 ساعات
-
الإنجليزية

Cybersecurity and Its Ten Domains
This course is designed to introduce students, working professionals and the community to the exciting field of cybersecurity. Throughout the MOOC, participants will engage in community discourse and online interaction. Participants will gain knowledge and understanding of cybersecurity and its domains.
-
Course by
-
Self Paced
-
24 ساعات
-
الإنجليزية

Cryptography and Hashing Overview
Continue learning about blockchain technology by diving into the nature of ownership and how the blockchain is one way to approach decentralized transaction handling. This course also demystifies cryptography and hashing, which are critical for authenticating users and guaranteeing transaction privacy. This course requires the purchase of two books for the completion of assignments: Drescher, D. (2017). Blockchain Basics: A Non-Technical Introduction in 25 Steps. (ISBN-13: 978-1484226032) Antonoupoulos, A. M. (2017). The Internet of Money, Volume Two. (ISBN-13: 978-1947910065)
-
Course by
-
Self Paced
-
10 ساعات
-
الإنجليزية

Secure Coding Practices
This Specialization is intended for software developers of any level who are not yet fluent with secure coding and programming techniques.Through four courses, you will cover the principles of secure coding, concepts of threat modeling and cryptography and exploit vulnerabilities in both C/C++ and Java languages, which will prepare you to think like a hacker and protect your organizations information. The courses provide ample practice activities including exploiting WebGoat, an OWASP project designed to teach penetration testing.
-
Course by
-
Self Paced
-
الإنجليزية

Cryptographic Hash and Integrity Protection
Welcome to Cryptographic Hash and Integrity Protection! This course reviews cryptographic hash functions in general and their use in the forms of hash chain and hash tree (Merkle tree). Building on hash functions, the course describes message authentication focusing on message authentication code (MAC) based on symmetric keys. We then discuss digital signatures based on asymmetric cryptography, providing security properties such as non-repudiation which were unavailable in symmetric-cryptography-based message authentication. This course is a part of the Applied Cryptography specialization.
-
Course by
-
Self Paced
-
9 ساعات
-
الإنجليزية

Applied Cryptography
This specialization is intended for the learners interested in or already pursuing a career in computer security or other cybersecurity-related fields. Through four courses, the learners will cover the security of information systems, information entropy, classical cryptographic algorithms, symmetric cryptography, asymmetric/public-key cryptography, hash functions, message authentication codes, digital signatures, key management and distribution, and other fundamental cryptographic primitives and protocols.
-
Course by
-
Self Paced
-
الإنجليزية

Introduction to Applied Cryptography
This course is a non-mathematical introduction to the role that cryptography plays in providing digital security for everyday applications such as the internet, mobile phones, wireless networks and cryptocurrency. In this introductory course you will develop an understanding of the functionality and purpose of the main cryptographic tools we use today. You will learn how to make decisions about which cryptographic tools are most appropriate to deploy in specific settings.
-
Course by
-
Self Paced
-
الإنجليزية

Cyber Attack Countermeasures
This course introduces the basics of cyber defense starting with foundational models such as Bell-LaPadula and information flow frameworks. These underlying policy enforcements mechanisms help introduce basic functional protections, starting with authentication methods. Learners will be introduced to a series of different authentication solutions and protocols, including RSA SecureID and Kerberos, in the context of a canonical schema. The basics of cryptography are also introduced with attention to conventional block ciphers as well as public key cryptography.
-
Course by
-
Self Paced
-
19 ساعات
-
الإنجليزية

Encryption And Decryption Using C++
By the end of this project, you will be able to create a basic application using Vigenere encryption-decryption technique to encrypt and decrypt messages. Throughout the project, you will be able to identify the basics of cryptography and how to encrypt and decrypt messages using a specific technique, you will be able to apply concepts like ASCII codes and type casting.
-
Course by
-
Self Paced
-
2 ساعات
-
الإنجليزية

Advanced Cybersecurity Concepts and Capstone Project
In this course, you’ll learn about threat mitigation by following the three stages of threat modeling. The steps are: decomposing the application, determining and ranking threats, and determining countermeasures and mitigation. You’ll learn about access control, secure development, cryptography, as well as asset management. You’ll also be introduced to the types of attacks that IoT (Internet of Things) devices and services face. At the end of this course, you’ll also complete a focused security mitigation strategy plan for a given business.
-
Course by
-
Self Paced
-
8 ساعات
-
الإنجليزية

IT Fundamentals for Cybersecurity
There are a growing number of exciting, well-paying jobs in today’s security industry that do not require a traditional college degree. Forbes estimates that there will be as many as 3.5 million unfilled positions in the industry worldwide by 2021! One position with a severe shortage of skills is as a junior cybersecurity analyst. Throughout this specialization, you will learn concepts around cybersecurity tools and processes, system administration, operating system and database vulnerabilities, types of cyber attacks and basics of networking.
-
Course by
-
Self Paced
-
الإنجليزية

Unlocking Information Security I: From Cryptography to Buffer Overflows
Learn how systems are hacked and defended.
-
Course by
-
Self Paced
-
الإنجليزية

Fundamentals of Computer Network Security
This specialization in intended for IT professionals, computer programmers, managers, IT security professionals who like to move up ladder, who are seeking to develop network system security skills.
-
Course by
-
Self Paced
-
الإنجليزية

Data Security for Web Developers
This course is designed for novice learners looking to broader their knowledge of how to secure data for the web applications they have developed. The course starts with foundational ideas like SSL/TLS certificates, rules governing security like GDPR, and handling secrets. The second module is devoted to cryptography, while the third module covers access control.
-
Course by
-
Self Paced
-
10 ساعات
-
الإنجليزية

Cybersecurity
The Cybersecurity Specialization covers the fundamental concepts underlying the construction of secure systems, from the hardware to the software to the human-computer interface, with the use of cryptography to secure in…
-
Course by
-
Self Paced
-
الإنجليزية

Encryption with Python: Encrypt data with key pairs
This guided project, Encryption with Python: Encrypt data with key pairs, will help a beginning security analyst who is looking to use the Python Cryptography package to encrypt data using a public key and a private key to decrypt data. In this 1.5-hour long project-based course, you will learn how to create a private key using Python cryptography, use Python to save a key file, use Python cryptography to create a public key, encrypt a file using a Python generated public key, and decrypt a file using Python generated private key.
-
Course by
-
Self Paced
-
3 ساعات
-
الإنجليزية

Basic Cryptography and Programming with Crypto API
In this MOOC, we will learn the basic concepts and principles of crytography, apply basic cryptoanalysis to decrypt messages encrypted with mono-alphabetic substitution cipher, and discuss the strongest encryption technique of the one-time-pad and related quantum key distribution systems.
-
Course by
-
Self Paced
-
17 ساعات
-
الإنجليزية

Introduction to IT Security
Students will learn about the security management process. They will examine risk and risk management, including quantitative and qualitative risk assessments. The course includes discussion of security control types and physical security controls. Students will explore all aspects of Identity and Access Management (IAM) including single-factor and multi-factor authentication, account and access control, single sign-on and federation. Students will learn to harden endpoint devices including mobile and IoT devices.
-
Course by
-
Self Paced
-
23 ساعات
-
الإنجليزية

Blockchain Security
This course introduces blockchain security, including a description of how the blockchain works at each level of the blockchain ecosystem. The instructor begins with the building blocks that create the structure of blockchain, the cryptography that it uses for security, and the role of hash functions in the blockchain and how they can be attacked.
-
Course by
-
Self Paced
-
8 ساعات
-
الإنجليزية

التشفير باستخدام بايثون: تشفير البيانات باستخدام key pairs
سيساعد هذا المشروع الموجه للمستوى المتوسط في الأمن السيبراني و القرصنة الأخلاقية، التشفير باستخدام Python: تشفير البيانات بkey pairs ، محلل أمان مبتدئًا يتطلع إلى استخدام حزمة Python Cryptography لتشفير البيانات باستخدام مفتاح عام ومفتاح خاص لفك تشفير البيانات.
-
Course by
-
Self Paced
-
3 ساعات
-
عربي

Decryption with Python
By the end of this project, you will be able to apply different decryption algorithms and techniques using Python. Moreover, you will apply cryptography concepts through completing several practical exercises to build a solid foundation in decrypting information and data using several renowned industry encryption algorithms.
-
Course by
-
Self Paced
-
3 ساعات
-
الإنجليزية

Secure Software Development: Verification and More Specialized Topics
Learn how to verify software for security, and take a deeper dive into the basics of applying threat models and cryptography.
-
Course by
-
الإنجليزية

Try It: Cybersecurity Basics
Do you want to add cybersecurity to your professional skill set? Join this free introductory course to learn cybersecurity basics — and without any prior experience. You’ll learn about the Confidentiality, Integrity, and Availability (CIA) Triad, and how it applies to the daily tasks of a cyber professional. You’ll also examine the basics of cryptography and apply them in an encryption-decryption challenge.
-
Course by
-
1
-
الإنجليزية