課程信息
5.0
4 個評分
1 個審閱
100% 在線

100% 在線

立即開始,按照自己的計劃學習。
可靈活調整截止日期

可靈活調整截止日期

根據您的日程表重置截止日期。
初級

初級

完成時間(小時)

完成時間大約為23 小時

建議:6 hours/week...
可選語言

英語(English)

字幕:英語(English)
100% 在線

100% 在線

立即開始,按照自己的計劃學習。
可靈活調整截止日期

可靈活調整截止日期

根據您的日程表重置截止日期。
初級

初級

完成時間(小時)

完成時間大約為23 小時

建議:6 hours/week...
可選語言

英語(English)

字幕:英語(English)

教學大綱 - 您將從這門課程中學到什麼

1
完成時間(小時)
完成時間為 4 小時

Understand the Risk Management Process

Module Topic: Risk Visibility and Reporting, Risk management Concepts, Risk Assessment, Risk Treatment, Audit Findings. In Risk visibility and Reporting, you will learn about risk register, creating a risk register, risk register, and risk management steps. In Risk Management Concepts, you will learn about, key terms, and generic risk model with key factors - NIST SP 800-30 R1. In risk Assessment, you will learn about NIST SP 800- 30 R1 risk assessment methodology, Step 1. prepare for the assessment, Step 2. conduct the assessment, Step 2a. identify threat sources, step 2b. identify potential threat events, step 2c. identify vulnerabilities and predisposing conditions, step 2d. determine likelihood, step 2e. determine impact, step 2f. risk determination, risk level matrix, risk levels, step 3. communicating and sharing risk assessment information, step 4. maintaining the risk assessment, and risk assessment activity. In Risk Treatment, you will learn about, risk mitigation, example control: passwords, control selection, residual risk, risk transference, risk avoidance, and risk acceptance. In audit Findings, you will learn about auditors, types of audits, audit methodologies, auditor responsibilities, audit scope, documentation, and response to audit. ...
Reading
14 個視頻 (總計 84 分鐘), 14 個閱讀材料, 1 個測驗
Video14 個視頻
Risk Management Process: Creating a Risk Register7分鐘
Risk Management Process: Risk Register Risk Management Steps8分鐘
Risk Management Process: Key Terms5分鐘
Risk Management Process: Key Terms6分鐘
Risk Management Process: Risk Assessment3分鐘
Risk Management Process: Preparation Steps7分鐘
Risk Management Process: Step 2b4分鐘
Risk Management Process: Quantitative Analysis8分鐘
Risk Management Process: Qualitative Analysis5分鐘
Risk Management Process: Step 33分鐘
Risk Management Process: Risk Treatment5分鐘
Risk Management Process: Risk Avoidance5分鐘
Risk Management Process: Type of Audits7分鐘
Reading14 個閱讀材料
Risk Management Process: Risk Visibility and Reporting10分鐘
Risk Management Process: Creating a Risk Register10分鐘
Risk Management Process: Risk Register Risk Management Steps10分鐘
Risk Management Process: Key Terms10分鐘
Risk Management Process: Key Terms10分鐘
Risk Management Process: Risk Assessment10分鐘
Risk Management Process: Preparation Steps10分鐘
Risk Management Process: Step 2b10分鐘
Risk Management Process: Quantitative Analysis10分鐘
Risk Management Process: Qualitative Analysis10分鐘
Risk Management Process: Step 310分鐘
Risk Management Process: Risk Treatment10分鐘
Risk Management Process: Risk Avoidance10分鐘
Risk Management Process: Type of Audits10分鐘
Quiz1 個練習
Quiz 120分鐘
2
完成時間(小時)
完成時間為 3 小時

Perform Security Assessment Activities

Module Topics: Participate in Security and Test Results, Penetration Testing. In Participate in Security and Test Results, you will learn about vulnerability scanning and analysis, vulnerability testing software categories, vulnerability testing qualities, potential problems, host scanning, host security considerations, traffic types, security gateway types, wireless networking testing, potential security issues, searching for rogue access points, locking down the enterprise, wireless tools, war dialing, and war driving. In Penetration Testing you will learn about penetration testing modes, white box / hat, gray box / hat, black box / hat, phase 1: preparation, reporting, phase 2: reconnaissance and network mapping techniques, reconnaissance, social engineering and low-tech reconnaissance, whois attacks, DNS zone transfers, network mapping, network mapping techniques, firewalking, basic built-in tools, phase 3: information evaluation and risk analysis, phase 4: active penetration, phase 5: analysis and reporting, penetration testing high-level steps....
Reading
11 個視頻 (總計 73 分鐘), 11 個閱讀材料, 1 個測驗
Video11 個視頻
Security Assessment Activities: Potential Problems6分鐘
Assessment Activities: Security Gateway Types5分鐘
Security Assessment Activities: Potential Security Issues6分鐘
Security Assessment Activities: Penetration Testing6分鐘
Security Assessment Activities: White Box / Hat8分鐘
Security Assessment Activities: Reconnaissance4分鐘
Security Assessment Activities: DNS Zone Transfers7分鐘
Security Assessment Activities: Network Mapping Techniques9分鐘
Security Assessment Activities: Firewalking6分鐘
Security Assessment Activities: Active Penetration6分鐘
Reading11 個閱讀材料
Security Assessment Activities: Participate in Security and Test Results10分鐘
Security Assessment Activities: Potential Problems10分鐘
Assessment Activities: Security Gateway Types10分鐘
Security Assessment Activities: Potential Security Issues10分鐘
Security Assessment Activities: Penetration Testing10分鐘
Security Assessment Activities: White Box / Hat10分鐘
Security Assessment Activities: Reconnaissance10分鐘
Security Assessment Activities: DNS Zone Transfers10分鐘
Security Assessment Activities: Network Mapping Techniques10分鐘
Security Assessment Activities: Firewalking10分鐘
Security Assessment Activities: Active Penetration10分鐘
Quiz1 個練習
Quiz 220分鐘
3
完成時間(小時)
完成時間為 4 小時

Operate and Maintain Monitoring Systems & Analyze and Report Monitoring Results

Module Topics: Events of Interest, Logging, source Systems, Security Analytics, metrics, and Trends, Visualization, Event Data Analysis, Communication of Findings. In Events of Interest you will learn about, monitoring terminology, Intrusion Detection System (IDS)/Intrusion Prevention System (IPS), comparing IDS and IPS, types of IDS/IPS devices, deploying HIDS and NIDS, implementation issues for monitoring, monitoring control, other considerations, sample questions to consider, collecting data for incident response, monitoring response techniques, attackers, attacker motivations, intrusions, events, types of monitoring, and file integrity checkers, continuous/compliance monitoring. In Logging, you will learn about reviewing host logs, reviewing incident logs, log anomalies, log management, clipping levels, filtering, log consolidation, log retention, centralized logging (syslog and log aggregation), syslog, distributed log collectors, hosted logging services, configuring event sources (s-flow, NetFlow, sniffer), Cosco NetFlow, What is an IP Flow, IP packet attributes, understanding network behavior, how to access the data produced by NetFlow, How does the router or switch determine which flows to export to the NetFlow collector server, format of the export data, sFlow, event correlation systems (security, information, and event management (SIEM)), SIEM functions, compliance, enhanced network security and improved IT/security operations, and full packet capture. In Source System, you will learn about comprehensive application, middleware, OS, and infrastructure monitoring, hyper capabilities, and operations manager. Analyze and Report Monitoring: In Security Analytics, Metrics, and Trends, you will learn about security baseline, network security baseline, metrics and analysis (MA), systems security engineering capability maturity model (SSE-CMM), and potential metrics. In visualization topic, you will learn about data visualization tools. In Event Data Analysis, you will learn about logs, log management, log management recommendations, and Potential uses of server log data. In Communication of Findings, you will learn about checklist for report writers and reviewers. ...
Reading
12 個視頻 (總計 75 分鐘), 12 個閱讀材料, 1 個測驗
Video12 個視頻
Monitoring Systems: IDS/IPS5分鐘
Monitoring Systems: Implementation Issues for Monitoring6分鐘
Maintain Monitoring Systems: Sample Questions6分鐘
Maintain Monitoring Systems: Attacker Motivations7分鐘
Maintain Monitoring Systems: Logging5分鐘
Maintain Monitoring Systems: Log Anomalies5分鐘
Maintain Monitoring Systems: Log Retention6分鐘
Monitoring Systems: Compliance6分鐘
Monitoring Results: Security Baseline6分鐘
Monitoring Results: SSE-CMM6分鐘
Monitoring Results: Potential Uses of Server Log Data6分鐘
Reading12 個閱讀材料
Monitoring Systems: Monitoring Terminology10分鐘
Monitoring Systems: IDS/IPS10分鐘
Monitoring Systems: Implementation Issues for Monitoring10分鐘
Maintain Monitoring Systems: Sample Questions10分鐘
Maintain Monitoring Systems: Attacker Motivations10分鐘
Maintain Monitoring Systems: Logging10分鐘
Maintain Monitoring Systems: Log Anomalies10分鐘
Maintain Monitoring Systems: Log Retention10分鐘
Monitoring Systems: Compliance10分鐘
Monitoring Results: Security Baseline10分鐘
Monitoring Results: SSE-CMM10分鐘
Monitoring Results: Potential Uses of Server Log Data10分鐘
Quiz1 個練習
Quiz 320分鐘
4
完成時間(小時)
完成時間為 4 小時

Incident Response and Recovery

Module Topics: Preparation, Detection and Analysis, Containment, Eradication, and Recovery, Post-Incident Activity, Implementation of Countermeasures. In Introduction, you will learn about incident response, and basic definitions. In preparation, you will learn about elements of an incident response policy, incident response plan, training, incident response tools, communication planning, communication with law enforcement, media, requirements for effective incident handling, the incident response team, core team areas, centralized and decentralized teams, team structure, team conditions that support success, and other considerations. In Detection and Analysis, you will learn about Intrusion Detection Systems (IDS) and Intrusion Prevention Systems (IPS), types of intrusion systems, intrusion detection techniques, false positives and false negatives, anti-malware systems, security information event management (SIEM), Incident analysis, packet sniffers, Inline SSL decryption devices, incident documentation, records, assessing risk, response, containment strategy considerations, Delaying containment, areas of focus, defining an incident, triage, and notification. In Containment, Eradication, and Recovery, you will learn about common containment activities, and eradication. In post-incident activity, you will learn about effective incident response. In implementation of Countermeasures, you will learn about implementation steps. ...
Reading
13 個視頻 (總計 77 分鐘), 13 個閱讀材料, 1 個測驗
Video13 個視頻
Incident Handling: Preparation6分鐘
Incident Handling: Training6分鐘
Incident Handling: Communication Planning7分鐘
Incident Handling: The Incident Response Team7分鐘
Incident Handling: IDS and IPS4分鐘
Incident Handling: Intrusion Detection Techniques7分鐘
Incident Handling: Anti-Malware Systems2分鐘
Incident Handling: Packet Sniffers6分鐘
Incident Handling: SSL Decryption Devices4分鐘
Incident Handling: Records6分鐘
Incident Handling: Delaying Containment6分鐘
Incident Handling: Containment, Eradication, and Recovery4分鐘
Reading13 個閱讀材料
Incident Handling: Incident Response10分鐘
Incident Handling: Preparation10分鐘
Incident Handling: Training10分鐘
Incident Handling: Communication Planning10分鐘
Incident Handling: The Incident Response Team10分鐘
Incident Handling: IDS and IPS10分鐘
Incident Handling: Intrusion Detection Techniques10分鐘
Incident Handling: Anti-Malware Systems10分鐘
Incident Handling: Packet Sniffers10分鐘
Incident Handling: SSL Decryption Devices10分鐘
Incident Handling: Records10分鐘
Incident Handling: Delaying Containment10分鐘
Incident Handling: Containment, Eradication, and Recovery10分鐘
Quiz1 個練習
Quiz 420分鐘

講師

Avatar

(ISC)² Education & Training

Education & Training

關於 (ISC)²

(ISC)² is an international nonprofit membership association focused on inspiring a safe and secure cyber world. Best known for the acclaimed Certified Information Systems Security Professional (CISSP®) certification, (ISC)2 offers a portfolio of credentials that are part of a holistic, programmatic approach to security. www.isc2.org ...

關於 (ISC)² Systems Security Certified Practitioner (SSCP) 專項課程

Pursue better IT security job opportunities and prove knowledge with confidence. The SSCP Professional Training Certificate shows employers you have the IT security foundation to defend against cyber attacks – and puts you on a clear path to earning SSCP certification. Learn on your own schedule with 120-day access to content aligned with the latest (ISC)2 SSCP exam domains. We’re offering the complete online self-paced program for only $1,000 – a $200 savings when you get all domains bundled together. 3 Steps to Career Advancement 1. Register for the course 2. Gain access for 120 days 3. Register and sit for the SSCP certification exam Upon completing the SSCP Professional Certificate, you will: 1. Complete six courses of preparing you to sit for the Systems Security Certified Practitioner (SSCP) certification exam as outlined below. Course 1 - Access Controls Course 2 - Security Operations and Administration Course 3 - Risk Identification, Monitoring, and Analysis/Incident Response and Recovery Course 4 - Cryptography Course 5 - Network and Communication Security Course 6 - Systems and Application Security 2. Receive a certificate of program completion. 3. Understand how to implement, monitor and administer an organization’s IT infrastructure in accordance with security policies and procedures that ensure data confidentiality, integrity and availability....
(ISC)² Systems Security Certified Practitioner (SSCP)

常見問題

  • 是的,您可以在注册之前预览第一个视频和查看授课大纲。您必须购买课程,才能访问预览不包括的内容。

  • 如果您决定在班次开始日期之前注册课程,那么您将可以访问课程的所有课程视频和阅读材料。班次开始之后,您便可以提交作业。

  • 在您注册且班次开课之后,您将可以访问所有视频和其他资源,包括阅读材料内容和课程论坛。您将能够查看和提交练习作业,并完成所需的评分作业以获得成绩和课程证书。

  • 如果您成功完成课程,您的电子课程证书将添加到您的成就页中,您可以通过该页打印您的课程证书或将其添加到您的领英档案中。

  • 此课程是 Coursera 上提供的众多课程之一,当前只对已购买课程或已获得助学金的学生开放。如果您要学习此课程,但却承担不起课程费用,我们建议您提交助学金申请。

  • The course schedule contains approximately 21 hours of content material covering lectures, reading materials, a case study, and quizzes broken up over the course of 7 weeks

還有其他問題嗎?請訪問 學生幫助中心