starstarstarstarstar_half
Managing G Suite is the second course in the G Suite Administration series. This course focuses on the G Suite core services such as Gmail, Calendar, and Drive & Docs. You will become familiar with the various service settings, and learn how to enable them for all or just a subset of your users. You will gain an understanding of Google Vault, Google’s ediscovery service. You will understand the various admin console reports that are available and be able to search and filter the information in these reports. Finally you will see how multiple domains can be used with G Suite and learn how to add a new domain to your account. Learning Objectives By the end of this course participants will be able to: - Enable and disable G Suite services for different parts of the organization. - Configure common settings for G Suite core services such as Gmail, Calendar, and Drive and Docs. - Understand the mobile device management options available in G Suite. - Describe Google Vault and learn how to use it to retain, search and export your organization's data. - Navigate and interpret G Suite admin reports and setup administrator alerts. - Explain the basics of multi domain management within G Suite. Prerequisites You should have completed the Introduction to G Suite course.
    starstarstarstarstar_border
    This course will teach you how to develop an embedded systems device. In order to reduce the time to market, many pre-made hardware and software components are available today. You'll discover all the available hardware and software components, such as processor families, operating systems, boards and networks. You'll also learn how to actually use and integrate these components. At the end of the course you will be ready to start architecting and implementing your own embedded device! You'll learn how to debug and finetune your device and how to make it run on a low power supply.
      starstarstarstarstar_half
      Introduction to G Suite is the first course in the G Suite Administration series of courses. This series will serve as the starting place for any new G Suite admin as they begin their journey of managing and establishing G Suite best practices for their organization. These courses together will leave you feeling confident to utilize the basic functions of the admin console to manage users, control access to services, configure security settings, and much more. Through a series of readings and step-by-step hands-on exercises, and knowledge checks, learners can expect to leave this training with all of the skills they need to get started as G Suite administrators. In this course you will sign up for a G Suite account and configure your DNS records for G Suite. You will learn how to provision and manage your users, and will create groups and calendar resources for your organization. You will be introduced to your Cloud Directory and will learn how to split your organization into organizational units to simplify user and service management. Finally you will learn how to delegate admin privileges to other users in your organization. Learning Objectives By the end of this course participants will be able to: - Setup a G Suite account and access and navigate the admin console. - Describe the key properties of the G Suite directory. - Provision users, groups and calendar resources in G Suite. - Undertake common user management tasks. - Explain how an organizational structure can be used in G Suite to simplify user and service management. - Describe the types of admin roles available in G Suite. - Use the G Suite Help Center as an aid to managing G Suite. IMPORTANT - To get the most out of this training course, learners should be prepared to: - Purchase a new domain through a registrar such as enom, GoDaddy. Note: If you already have a domain that you would like to use for the trial you can do this but this course does not provide detailed steps on how to associate an existing domain with a G Suite trial account. For detailed instructions on how to do that, please refer to this Help Center article: https://support.google.com/a/topic/9196 - Provide credit card details as part of the G Suite account setup. You will be using a 14 day trial G Suite Enterprise account during this course. As part of the sign up flow you will be required to provide credit card details. No charges for G Suite are made to your credit card until the trial period has ended. You must ensure that you CANCEL YOUR SUBSCRIPTION before the trial period ends to avoid and charges. This is very IMPORTANT so don't forget! - Install and be ready to use the latest version of Chrome web browser available at https://www.google.com/chrome/
        starstarstarstarstar_border
        This course introduces you to the principles of secure programming. It begins by discussing the philosophy and principles of secure programming, and then presenting robust programming and the relationship between it and secure programming. We'll go through a detailed example of writing robust code and we'll see many common programming problems and show their connection to writing robust, secure programs in general. We’ll examine eight design principles that govern secure coding and how to apply them to your own work. We’ll discuss how poor design choices drive implementation in coding. We’ll differentiate between informal, formal, and ad hoc coding methods. Throughout, methods for improving the security and robustness of your programs will be emphasized and you will have an opportunity to practice these concepts through various lab activities. A knowledge of the C programming language is helpful, but not required to participate in the lab exercises.
          starstarstarstarstar_half
          This course provides learners with a baseline understanding of common cyber security threats, vulnerabilities, and risks. An overview of how basic cyber attacks are constructed and applied to real systems is also included. Examples include simple Unix kernel hacks, Internet worms, and Trojan horses in software utilities. Network attacks such as distributed denial of service (DDOS) and botnet- attacks are also described and illustrated using real examples from the past couple of decades. Familiar analytic models are outlined such as the confidentiality/integrity/availability (CIA) security threat framework, and examples are used to illustrate how these different types of threats can degrade real assets. The course also includes an introduction to basic cyber security risk analysis, with an overview of how threat-asset matrices can be used to prioritize risk decisions. Threats, vulnerabilities, and attacks are examined and mapped in the context of system security engineering methodologies.
            starstarstarstar_border star_border
            This course introduces the fundamentals of high-performance and parallel computing. It is targeted to scientists, engineers, scholars, really everyone seeking to develop the software skills necessary for work in parallel software environments. These skills include big-data analysis, machine learning, parallel programming, and optimization. We will cover the basics of Linux environments and bash scripting all the way to high throughput computing and parallelizing code. After completing this course, you will familiar with: *The components of a high-performance distributed computing system *Types of parallel programming models and the situations in which they might be used *High-throughput computing *Shared memory parallelism *Distributed memory parallelism *Navigating a typical Linux-based HPC environment *Assessing and analyzing application scalability including weak and strong scaling *Quantifying the processing, data, and cost requirements for a computational project or workflow This course can be taken for academic credit as part of CU Boulder’s Master of Science in Data Science (MS-DS) degree offered on the Coursera platform. The MS-DS is an interdisciplinary degree that brings together faculty from CU Boulder’s departments of Applied Mathematics, Computer Science, Information Science, and others. With performance-based admissions and no application process, the MS-DS is ideal for individuals with a broad range of undergraduate education and/or professional experience in computer science, information science, mathematics, and statistics. Learn more about the MS-DS program at https://www.coursera.org/degrees/master-of-science-data-science-boulder.
              starstarstarstarstar_border
              What makes WiFi faster at home than at a coffee shop? How does Google order its search results from the trillions of webpages on the Internet? Why does Verizon charge $15 for every GB of data we use? Is it really true that we are connected in six social steps or less? These are just a few of the many intriguing questions we can ask about the social and technical networks that form integral parts of our daily lives. This course is about exploring the answers, using a language that anyone can understand. We will focus on fundamental principles like “sharing is hard”, “crowds are wise”, and “network of networks” that have guided the design and sustainability of today’s networks, and summarize the theories behind everything from the social connections we make on platforms like Facebook to the technology upon which these websites run. Unlike other networking courses, the mathematics included here are no more complicated than adding and multiplying numbers. While mathematical details are necessary to fully specify the algorithms and systems we investigate, they are not required to understand the main ideas. We use illustrations, analogies, and anecdotes about networks as pedagogical tools in lieu of detailed equations. All the features of this course are available for free. It does not offer a certificate upon completion.
                starstarstarstarstar_half
                This course is the definitive introduction to blockchain for both the developer and non-developer audience. Beyond the technology, this course will introduce you to some of the philosophy behind decentralization and why there is so much excitement around it. During the first three modules, you'll be introduced to blockchain and the technology behind it. In module four, we'll go beyond bitcoin and delve deeper into a next-generation blockchain called Ethereum to introduce you to what modern blockchains can do. The use cases featured in the final module are drawn from among the businesses in ConsenSys' startup portfolio. We believe we're uniquely positioned to present you with a valuable behind-the-scenes look at the people and companies working in this space to help give you a better understanding of the business side of blockchain. Together, we'll examine businesses use cases, hear from industry leaders, and give you the opportunity to develop and analyze a use case yourself. With this course, not only will you be the one who is able to explain blockchain to your colleagues, you'll be well on your way to making educated business decisions with your new, foundational understanding of the technology.
                  starstarstarstarstar_half
                  By nature, cyber conflicts are an international issue that span across nation-state borders. By the end of the course, you will be able to apply the knowledge gained for analysis and management of international cyber incidents and conflicts including for activities such as development of policy related to cybercrime and cyberwarfare. Management of cyber incidents and conflicts requires an interdisciplinary perspective including an understanding of: 1) characteristics of the cyber threats and conflicts themselves, 2) international efforts to reduce and improve cyber security, and 3) psychological and sociopolitical factors. The course is designed to reach an international audience and will encourage discussion on relevant current events among participants to enrich the experience with various personal and cultural perspectives on cutting-edge issues. In addition, assignments and other assessments will supplement video lectures and selected readings to ensure application of the material. After taking this course you will be able to: • Identify different types of actors involved in cyber threats (individuals, organizations & nation-states) • Distinguish between different types of threats and issues in cyber security including, data theft, political espionage, critical infrastructure protection, and propaganda • Detail the basic characteristics of the Internet infrastructure and international efforts to address Internet governance • List several international efforts to address cyber crime and espionage • Evaluate how principals that govern international conflicts might be applied in context of cyber security • Apply different psychological theories of human motivation and cooperation and communication and political theories in analysis of different international issues related to cyber security including censorship, media operations and role of social technologies. Grading: Your grade is assessed based on discussion posts and quizzes. Individual taking this course for credit (i.e. students at the University at Albany y will be required to engage in additional activities communicated to them directly). Recommended Background: No background knowledge or skills are necessary, but an understanding and familiarity of cyber security, Internet infrastructure and international law would be advantageous for anyone who participates in the course. ACKNOWLEDGEMENTS Ersin Dincelli and Nic DePaula were the instructional designers for the course who assisted in the recording of the videos, reviewing material, creating slides, assessments and some of the content. Without their tremendous effort this would not have been possible. We also acknowledge the financial support for the recordings from the University at Albany as well as the support from Media and Marketing. Finally, thanks to Lisa Stephens who is the SUNY liaison to Coursera for being a strong supporter of the MOOC.
                    starstarstarstarstar_half
                    Computers are everywhere, they aren't just the desktops and laptops we use for work but the phones in our pockets and even the watches on our wrists are also computers. You probably use a computer every day and in fact you are reading this on a computer! Just because we use computers all the time, doesn't mean that we understand them, or find them easy to use. Computer Science is the science of computers, it is the field of knowledge that experts use to understand computer systems. Knowing a little computer science will help you understand the computers all around you. This isn't a how-to course for a particular piece of software, instead you will learn some fundamental concepts that you can apply to any software or computer system. You'll apply these concepts to the kind of computer systems we use every day, including word processing applications, e-commerce, the internet and web sites. You will learn how to apply computer science concepts to solve problems in daily computer use and generally be a better computer user. Taking this course could be the start of your career in computer science, and the course is an introduction to the Bachelors in Computer Science from University of London, but it is also for you if you just want to learn a little computer science to help you better understand the computers you use in your ordinary life.