In this first course of the specialization, we will discuss the limitations of the Internet for business and economic activity, and explain how blockchain technology represents the way forward. After completing this course, you will be able to explain what blockchain is, how it works, and why it is revolutionary. You will learn key concepts such as mining, hashing, … [Read more...] about Introduction to Blockchain Technologies
Computer Security and Networks
Blockchain, Cryptoassets, and Decentralized Finance
Today, large intermediaries establish trust in our economy and control the movement, storage, and allocation of money and assets. The status quo, however, is rife with inefficiencies. In this course, we’ll address the many challenges of the status quo and discuss how cryptoassets, smart contracts, new identity systems, and new financial business models can help overcome … [Read more...] about Blockchain, Cryptoassets, and Decentralized Finance
The Bits and Bytes of Computer Networking
This course is designed to provide a full overview of computer networking. We’ll cover everything from the fundamentals of modern networking technologies and protocols to an overview of the cloud to practical applications and network troubleshooting. By the end of this course, you’ll be able to: â— describe computer networks in terms of a five-layer model â— understand … [Read more...] about The Bits and Bytes of Computer Networking
Introduction to Google Workspace Administration
Introduction to Google Workspace Administration is the first course in the Google Workspace Administration series of courses. This series will serve as the starting place for any new Google Workspace admin as they begin their journey of managing and establishing Google Workspace best practices for their organization. These courses together will leave you feeling confident to … [Read more...] about Introduction to Google Workspace Administration
Introduction to Cyber Attacks
This course provides learners with a baseline understanding of common cyber security threats, vulnerabilities, and risks. An overview of how basic cyber attacks are constructed and applied to real systems is also included. Examples include simple Unix kernel hacks, Internet worms, and Trojan horses in software utilities. Network attacks such as distributed denial of service … [Read more...] about Introduction to Cyber Attacks