課程信息
39,831 次近期查看

第 1 門課程(共 4 門)

100% 在線

立即開始,按照自己的計劃學習。

可靈活調整截止日期

根據您的日程表重置截止日期。

初級

完成時間大約為13 小時

建議:9 hours/week...

英語(English)

字幕:英語(English)

您將獲得的技能

CybersecurityInformation Security (INFOSEC)Denial-Of-Service Attack (DOS)Risk Assessment
學習Course的學生是
  • Security Engineers
  • Auditors
  • Paralegals
  • IT Managers
  • Technical Solutions Engineers

第 1 門課程(共 4 門)

100% 在線

立即開始,按照自己的計劃學習。

可靈活調整截止日期

根據您的日程表重置截止日期。

初級

完成時間大約為13 小時

建議:9 hours/week...

英語(English)

字幕:英語(English)

教學大綱 - 您將從這門課程中學到什麼

1
完成時間為 5 小時

Introduction to Cyber Security

10 個視頻 (總計 47 分鐘), 6 個閱讀材料, 1 個測驗
10 個視頻
Assignments and Reading2分鐘
Hacking an Old-Fashioned Soda Machine4分鐘
Simple Worm Program4分鐘
Trojan Horse Login Program7分鐘
Malicious Compiler Program8分鐘
Typical Unix Kernel Attack6分鐘
Explaining Interview Series58
Welcome Lou Manousos (Part 1)5分鐘
Welcome Lou Manousos (Part 2)4分鐘
6 個閱讀材料
Required: Smashing the Stack for Fun and Profit,” Aleph One30分鐘
Required: “Reflections on Trusting Trust,” Ken Thompson30分鐘
Video: DEF CON 2346分鐘
Video: Kevin Mitnick | Talks at Google52分鐘
Suggested: Introduction to Cyber Security (Ch. 1-2)30分鐘
Suggested: TCP/IP Illustrated Volume 1 (2nd Ed.), (Ch. 1-2)30分鐘
1 個練習
Module 1 Quiz20分鐘
2
完成時間為 5 小時

Understanding Basic Security Frameworks

17 個視頻 (總計 85 分鐘), 6 個閱讀材料, 3 個測驗
17 個視頻
Purpose of Cyber Security4分鐘
Adversary Types7分鐘
Vulnerability Types5分鐘
Threat Types5分鐘
Matching Quiz1分鐘
Matching Quiz Solution1分鐘
Confidentiality Threat6分鐘
Integrity Threat6分鐘
Availability Threat5分鐘
Fraud Threat5分鐘
Testing for Vultnerabilities4分鐘
Attacks4分鐘
Brute Force vs. Hueristic Attacks3分鐘
Crytanalysis5分鐘
Cryptanalyzing Caesar Cipher4分鐘
Welcome Jose Dominguez9分鐘
6 個閱讀材料
Required: “Why Cryptosystems Fail,” Ross Anderson30分鐘
Required: “There Be Dragons,” Steve Bellovin30分鐘
Video: DMARC Whiteboard Session15分鐘
Video: Defcon 2622分鐘
Suggested: Introduction to Cyber Security, (Ch. 3 - 4)30分鐘
Suggested: TCP/IP Illustrated Volume 1 (2nd Ed.), (Ch. 3 – 4)30分鐘
3 個練習
Matching Quiz6分鐘
Further Consideration - Fraud2分鐘
Module 2 Quiz20分鐘
3
完成時間為 4 小時

Examining Cyber Threats More Closely

10 個視頻 (總計 81 分鐘), 6 個閱讀材料, 2 個測驗
10 個視頻
SQL/ Slammer Worm of 20034分鐘
Nachi Worm of 20039分鐘
Botnet Design12分鐘
Botnet Arithmetic10分鐘
Welcome Elad Yoran11分鐘
Assets and Infrastructure8分鐘
Calculating Risk8分鐘
Making Security and Cost Decisions Based on Risk5分鐘
Threat Trees and Completeness of Analysis6分鐘
6 個閱讀材料
Required: “Hackers Remotely Kill a Jeep on the Highway with Me in It,” Andy Greenberg, Wired Magazine10分鐘
Required: “A Hacker’s Evolution: Austin’s HD Moore Grew Up with Cybersecurity Industry,” 512 Tech10分鐘
Suggested: Introduction to Cyber Security (Ch. 5 - 6)30分鐘
Suggested: TCP/IP Illustrated Volume 1 (2nd Edition), (Ch. 5 - 6)30分鐘
Video: “Top Hacker Shows Us How It’s Done,” Pablos Holman, TEDx Midwest18分鐘
Video: “All Your Devices Can be Hacked,” Avi Rubin, TED Talk17分鐘
2 個練習
Further Consideration - Threat Trees2分鐘
Module 3 Quiz20分鐘
4
完成時間為 4 小時

Introducing Security Risk Analysis

8 個視頻 (總計 61 分鐘), 8 個閱讀材料, 2 個測驗
8 個視頻
Mapping Assets to Threats7分鐘
Estimating Risk for Threat-Asset Pairs5分鐘
Example Case Study Matrix (Part 1)8分鐘
Example Case Study Matrix (Part 2)9分鐘
Example Case Study Matrix (Part 3)7分鐘
Mapping Assets, Threats, Vulnerabilities, and Attacks5分鐘
Welcome Nasir Memon14分鐘
8 個閱讀材料
Required: “A Man-in-the-Middle Attack on UMTS,” Meyer and Wetzel10分鐘
Required: “Are Computer Hacker Break-Ins Ethical?” Eugene Spafford10分鐘
Video: “What’s Wrong With Your Password,” Lorrie Faith Cranor, TED Talk18分鐘
Video: “Fighting Viruses, Defending the Net,” Mikko Hypponen, TED Talk17分鐘
Suggested: Introduction to Cyber Security, (Ch. 7 - 8)30分鐘
Suggested: TCP/IP Illustrated Volume 1 (2nd Ed.), (Ch. 7 – 8)30分鐘
Project Description10分鐘
Additional Self-Learning Opportunities10分鐘
2 個練習
Module 4 Quiz20分鐘
Final Quiz - What level of security risk do you estimate for the following threat-asset matrix entries for the ACME Software Company:18分鐘
4.7
177 個審閱Chevron Right

32%

完成這些課程後已開始新的職業生涯

31%

通過此課程獲得實實在在的工作福利

來自Introduction to Cyber Attacks的熱門評論

創建者 AAFeb 26th 2018

Great introduction to cybersecurity concepts with relevant supplemental material in the form of journal papers, magazine articles and supporting TED talks and videos. Highly recommended!

創建者 RJMay 3rd 2019

It was fun and challenging. There were few areas were in the quiz where I need to google a few terms which I have not heard before. But other than that it was really fun. Learned a lot.

講師

Avatar

Dr. Edward G. Amoroso

Research Professor, NYU and CEO, TAG Cyber LLC
Computer Science

關於 纽约大学坦登工程学院

Tandon offers comprehensive courses in engineering, applied science and technology. Each course is rooted in a tradition of invention and entrepreneurship....

關於 Introduction to Cyber Security 專項課程

Introduction to Cyber Security was designed to help learners develop a deeper understanding of modern information and system protection technology and methods. The learning outcome is simple: We hope learners will develop a lifelong passion and appreciation for cyber security, which we are certain will help in future endeavors. Students, developers, managers, engineers, and even private citizens will benefit from this learning experience. Special customized interviews with industry partners were included to help connect the cyber security concepts to live business experiences....
Introduction to Cyber Security

常見問題

  • 注册以便获得证书后,您将有权访问所有视频、测验和编程作业(如果适用)。只有在您的班次开课之后,才可以提交和审阅同学互评作业。如果您选择在不购买的情况下浏览课程,可能无法访问某些作业。

  • 您注册课程后,将有权访问专项课程中的所有课程,并且会在完成课程后获得证书。您的电子课程证书将添加到您的成就页中,您可以通过该页打印您的课程证书或将其添加到您的领英档案中。如果您只想阅读和查看课程内容,可以免费旁听课程。

還有其他問題嗎?請訪問 學生幫助中心