GRATIS
Harvard vía Coursera
GRATIS

Edge Computing Fundamentals

  • money

    Cursos gratis (Auditar)

    question-mark
  • earth

    Inglés

  • folder

    Siempre Abierto

  • certificate

    Guía de Registro en Coursera

    arrow
Acerca de este curso

  • Module 1: Exploring the Landscape of Edge Computing
    • Welcome to Module 1 of our comprehensive "Security at the Edge" course. In this module, we will lay the foundation for understanding edge computing and communication technologies, setting the stage for a deep dive into edge security. Engage with interactive content, including videos, quizzes, and simulations, to reinforce your understanding of edge computing and communication. By the end of this module, you will have a solid foundation in edge computing and communication technologies, and the core concepts of edge computing, its evolution, and its significance in today's digital landscape.
  • Module 2: Exploring Application and Confronting Challenges in Edge Networks
    • Welcome to Module 2 of our "Security at the Edge" course. In this module, we will explore the diverse applications of edge networks in crucial domains such as healthcare, IoT, automation, and the development of smart cities. Additionally, we will delve into the unique challenges that edge networks face. By the end of this module, you'll have a comprehensive understanding of how edge networks are shaping industries like healthcare, IoT, and Automation, as well as their role in the development of Smart Cities. You'll also be well-versed in the unique challenges that come with implementing edge solutions. Get ready to explore the fascinating world of edge network applications and tackle the complexities of edge network challenges. This knowledge will be invaluable as you progress in securing edge environments in the subsequent modules.
  • Module 3: A Closer Look at Edge Network Security and Privacy
    • Welcome to Module 3 of our "Security at the Edge" course, where we delve into the critical aspects of cybersecurity in edge networks. In this module, we'll explore key principles of cybersecurity, intrusion detection and prevention strategies specific to edge environments, essential security protocols, data transmission security, data flow in edge networks, edge network privacy, and data localization. By the end of this module, you'll have a comprehensive understanding of cybersecurity principles, effective intrusion detection and prevention techniques in edge networks, essential security protocols, and strategies for securing data, ensuring privacy, and addressing data localization requirements in edge environments. Let's dive into Module 3 and equip you with the knowledge and skills needed to safeguard edge networks effectively.