logo
company-profile-image
Coursera
verify
like
share-icon
employees
Number of Employees:
500-1500
activeJob
This training has been viewed 4735 times
You might also want to check

Introduction to Cyber Security Specialization

Type:
e-learning
Category:
IT security/Networks
Language:
English
Location:
Online
Price:
39 USD
Date:
eye-icon
On request
Training Description:

   Introduction to Cyber Security was designed to help learners develop a deeper understanding of modern information and system protection technology and methods. The learning outcome is simple: We hope learners will develop a lifelong passion and appreciation for cyber security, which we are certain will help in future endeavors. Students, developers, managers, engineers, and even private citizens will benefit from this learning experience. Special customized interviews with industry partners were included to help connect the cyber security concepts to live business experiences.

 

COURSE 1: Introduction to Cyber Attacks

About the Course

This course provides learners with a baseline understanding of common cyber security threats, vulnerabilities, and risks. An overview of how basic cyber attacks are constructed and applied to real systems is also included. Examples include simple Unix kernel hacks, Internet worms, and Trojan horses in software utilities. Network attacks such as distributed denial of service (DDOS) and botnet- attacks are also described and illustrated using real examples from the past couple of decades.  Familiar analytic models are outlined such as the confidentiality/integrity/availability (CIA) security threat framework, and examples are used to illustrate how these different types of threats can degrade real assets. The course also includes an introduction to basic cyber security risk analysis, with an overview of how threat-asset matrices can be used to prioritize risk decisions. Threats, vulnerabilities, and attacks are examined and mapped in the context of system security engineering methodologies.  

COURSE 2: Cyber Attack Countermeasures

About the Course

This course introduces the basics of cyber defense starting with foundational models such as Bell-LaPadula and information flow frameworks. These underlying policy enforcements mechanisms help introduce basic functional protections, starting with authentication methods. Learners will be introduced to a series of different authentication solutions and protocols, including RSA SecureID and Kerberos, in the context of a canonical schema.  The basics of cryptography are also introduced with attention to conventional block ciphers as well as public key cryptography. Important cryptographic techniques such as cipher block chaining and triple-DES are explained. Modern certification authority-based cryptographic support is also discussed and shown to provide basis for secure e-commerce using Secure Sockets Layer (SSL) schemes.

 

COURSE 3: Real-Time Cyber Threat Detection and Mitigation

About the Course

This course introduces real-time cyber security techniques and methods in the context of the TCP/IP protocol suites. Explanation of some basic TCP/IP security hacks is used to introduce the need for network security solutions such as stateless and stateful firewalls. Learners will be introduced to the techniques used to design and configure firewall solutions such as packet filters and proxies to protect enterprise assets.  Perimeter solutions such as firewalls and intrusion prevention systems are shown to have significant drawbacks in common enterprise environments. The result of such weakness is shown to often exist as advanced persistent threats (APTs) from nation-state actors. Such attacks, as well as DDOS and third-party attacks, are shown to have potential solutions for modern enterprise.  

COURSE 4: Enterprise and Infrastructure Security

About the Course

This course introduces a series of advanced and current topics in cyber security, many of which are especially relevant in modern enterprise and infrastructure settings. The basics of enterprise compliance frameworks are provided with introduction to NIST and PCI. Hybrid cloud architectures are shown to provide an opportunity to fix many of the security weaknesses in modern perimeter local area networks.    Emerging security issues in blockchain, blinding algorithms, Internet of Things (IoT), and critical infrastructure protection are also described for learners in the context of cyber risk. Mobile security and cloud security hyper-resilience approaches are also introduced. The course completes with some practical advice for learners on how to plan careers in cyber security.  

Who is eligible:

Beginner Specialization.

No prior experience required.

Additional Information

Projects Overview

Quizzes and projects for Introduction to Cyber Security were designed to exercise the learner’s understanding and retention of the covered topics. Emphasis is on foundational issues, rather than just memorizing facts. The goal is to help learners develop the habit of properly assessing and improving cyber risk posture in real computing, networking, and software systems. Authentic scenarios are included based on practical enterprise and infrastructure deployments to enhance the learning experience.

 

Enroll to start your 7-day free trial

 

  • Unlimited access to all courses in the Specialization

Watch lectures, try assignments, participate in discussion forums, and more.

  • Cancel anytime.

No penalties - simply cancel before the trial ends if it's not right for you.

  • $49 USD per month to continue learning after trial ends.

Go as fast as you can - the faster you go, the more you save.

  • Certificate when you complete.

Share on your resume, LinkedIn, and CV.

7-day Free Trial

  • Unlimited access to all courses in the Specialization

    Watch lectures, try assignments, participate in discussion forums, and more.

  • Cancel anytime.

    No penalties - simply cancel before the trial ends if it's not right for you.

  • $39 USD per month to continue learning after trial ends.

    Go as fast as you can - the faster you go, the more you save.

  • Certificate when you complete.

    Share on your resume, LinkedIn, and CV.

Speakers:

Created by:

New York University Tandon School of Engineering  

New York University strives to be a quality international center of scholarship, teaching and research. As one of the nation's most respected institutions, NYU Tandon School of Engineering aligns with this mission.

Tandon offers comprehensive courses in engineering, applied science and technology. Each course is rooted in a tradition of invention and entrepreneurship.

 

Dr Edward G Amoroso

Dr. Edward G. Amoroso

Research Professor, NYU and CEO, TAG Cyber LLC

Participation

To participate in this training, you can Enroll Now 

 

Enroll now
Share with Your Friends:
fb-icon-share
fb-icon-share
fb-icon-share
© Copyright 2016-2025 All Rights Reserved.
fb-icon
ln-icon
twitter-icon
telegram-icon
instagram-icon
youtube-icon