Network Security & Database Vulnerabilities

Course Link: https://www.coursera.org/learn/network-security-database-vulnerabilities

Network Security & Database Vulnerabilities
In this course you will learn about common network security threats and vulnerabilities. You will learn about common software application using the TCP/IP layer to connect computers together in a network. You will also learn about common security weaknesses in networked systems that can lead to unauthorized access to system resources. You will apply common web application programming practices (such as using HTTP over HTTPS) and common security software practices (such as using strong encryption) to design solutions to address security threats and vulnerabilities in the network. You will also learn about common security weaknesses in systems that can lead to unauthorized access to system resources.

At the end of this course, you will be able to:
1. Design a network security implementation using TCP/IP layer encryption and authentication
2. Prove your security design by implementing authentication, authorization, and control structures for the network
3. Use HTTP and HTTPS to secure an implementation of the network
4. Define common security weaknesses that can lead to unauthorized access to system resources
5. Define common security issues that can lead to unauthorized access to system resources
6. Describe common applications and services using HTTP and HTTPS
7. Use common web application programming practices (such as using HTTP over HTTPS) and common security software practices (such as using strong encryption) to design solutions to address security threats and vulnerabilities in the networkWeb Application Security
Authorship & Authorization
Network Security
Common Security Weaknesses
Networking on Android
In this course, you will learn about the basic concepts and principles of network communication on Android devices. You’ll learn about common protocols that control common network resources like the Internet and Bluetooth devices. You’ll also learn about how to use Google Cloud IoT services like Cloud NUCs and how to connect these services to the Android device through the Android Device Management Module (DMMS).

This is the fourth and last course in the Android mobile platform. You should have basic knowledge of the Android OS, core functionality (such as handling network calls), basic programming in Android (such as using the Android SDK and building C++ code), and Android device and network setup (such as using WiFi and Bluetooth). You should have some technical knowledge of TCP/IP, network communication basics (such as the basics of TCP/IP packets and common network application programming patterns), and basic programming in Java (like writing code in Java).Google Cloud IoT Services
TCP/IP Operations
Android Applications
Android Networking
Music Production
This course is the second course in a four-part series on producing music. In this course we focus on mastering your musical potential. We’ll be covering topics such as mastering, mastering engineers, technology, and techniques for maximizing musical output.

In this course, we will:
1. Summarize the topics and essential components of audio production with their

Course Link: https://www.coursera.org/learn/network-security-database-vulnerabilities