課程信息
4.7
148 個評分
19 個審閱
專項課程

第 3 門課程(共 4 門)

100% 在線

100% 在線

立即開始,按照自己的計劃學習。
可靈活調整截止日期

可靈活調整截止日期

根據您的日程表重置截止日期。
中級

中級

完成時間(小時)

完成時間大約為11 小時

建議:10 hours/week...
可選語言

英語(English)

字幕:英語(English)
專項課程

第 3 門課程(共 4 門)

100% 在線

100% 在線

立即開始,按照自己的計劃學習。
可靈活調整截止日期

可靈活調整截止日期

根據您的日程表重置截止日期。
中級

中級

完成時間(小時)

完成時間大約為11 小時

建議:10 hours/week...
可選語言

英語(English)

字幕:英語(English)

教學大綱 - 您將從這門課程中學到什麼

1
完成時間(小時)
完成時間為 5 小時

Basic Network Security

This module introduces the basics of TCP/IP for security, including firewall design and use....
Reading
13 個視頻 (總計 71 分鐘), 5 個閱讀材料, 1 個測驗
Video13 個視頻
Assignments and Reading2分鐘
Security Through Obscurity4分鐘
TCP/IP Evolution and Security6分鐘
TCP/IP Overview8分鐘
IP Spoofing5分鐘
TCP Sequence Number Attack5分鐘
Packet Flooding5分鐘
Packet Sniffing5分鐘
SYN Packets for Access Control5分鐘
Definition of a Firewall5分鐘
Firewall: Stateful versus Stateless5分鐘
Interview: John Viega8分鐘
Reading5 個閱讀材料
Required: “Network Firewalls,” Steve Bellovin and Bill Cheswick30分鐘
Required: “Introduction to TCP/IP Network Attacks,” Guang Yang45分鐘
Video: “Hacking DNS,” Eli the Computer Guy46分鐘
Suggested: Introduction to Cyber Security, Edward Amoroso and Matthew Amoroso, (Ch. 17 - 18)30分鐘
Suggested: TCP/IP Illustrated Volume 1 (2nd Edition), Kevin Fall and W. Richard Stevens, (Ch. 17 – 18)30分鐘
Quiz1 個練習
Module 1 Quiz20分鐘
2
完成時間(小時)
完成時間為 3 小時

More Advanced Network Security Technologies

This module introduces packet filters, firewall rule sets, proxies, and additional network security methods....
Reading
12 個視頻 (總計 65 分鐘), 4 個閱讀材料, 1 個測驗
Video12 個視頻
Packet Filtering7分鐘
Sample Packet Filtering and Reference Architecture5分鐘
Default Firewall Block4分鐘
Firewall Rules to Allow Outbound Web Browsing4分鐘
Firewall Rules to Allow Telnet and Other TCP Services3分鐘
Establishing Corporate Policy Rules4分鐘
FTP Protocol6分鐘
Firewall Rules for FTP3分鐘
Application Proxy Filtering6分鐘
Forward and Reverse Proxies4分鐘
Interview: Roger Piqueras Jover11分鐘
Reading4 個閱讀材料
Required: “Anomaly-based Network Intrusion Detection: Techniques, Systems, and Challenges.”20分鐘
Required: “Intrusion Detection via Static Analysis,” Wagner and Dean25分鐘
Video: “How Does Intrusion Prevention Systems Work,” 2013 - SourceFire6分鐘
Suggested: Introduction to Cyber Security, Edward Amoroso and Matthew Amoroso, (Chapters 19 - 20)30分鐘
Quiz1 個練習
Module 2 Quiz20分鐘
3
完成時間(小時)
完成時間為 3 小時

Network Security Architectures

This module introduces the foundations firewall architectures, intrusion detection, and SOC design....
Reading
11 個視頻 (總計 68 分鐘), 4 個閱讀材料, 1 個測驗
Video11 個視頻
Firewall Architectures (Part 1)6分鐘
Firewall Architectures (Part 2)6分鐘
Management by Exception5分鐘
System Auditing6分鐘
Basics of Intrusion Detection7分鐘
Signature Versus Behavioral Detection5分鐘
IDS Versus IPS6分鐘
Design of SIEM5分鐘
Design of a SOC6分鐘
Interview: Dino Dai Zovi9分鐘
Reading4 個閱讀材料
Required: “An Evening with Berferd,” Bill Cheswick20分鐘
Required: “IDES Model,” Dorothy Denning30分鐘
Video: “DEFCAMP 2015 – Building a Security Operations Center,”32分鐘
Suggested: Introduction to Cyber Security, Edward Amoroso and Matthew Amoroso, (Ch. 21 - 22)30分鐘
Quiz1 個練習
Module 3 Quiz20分鐘
4
完成時間(小時)
完成時間為 4 小時

Enterprise Network Security

This module introduces the limitations of perimeters, and the challenges in the enterprise of dealing with threats such as DDOS and APT....
Reading
12 個視頻 (總計 70 分鐘), 5 個閱讀材料, 2 個測驗
Video12 個視頻
Practical Limitations of Perimeter7分鐘
APT Schema Through Perimeter Holes6分鐘
Third Party Security5分鐘
Target APT Attack5分鐘
Large Government Agency Attack5分鐘
Layer 3 DDOS Protection6分鐘
Layer 7 Application Level DDOS Risk3分鐘
Large Financial Website DDOS Attacks4分鐘
Network Security Industry Overview2分鐘
Interview: Ray Cheng - Pt. 113分鐘
Interview: Ray Cheng - Pt. 26分鐘
Reading5 個閱讀材料
Required: “From the Enterprise Perimeter to Mobility Enabled Cloud,” Ed Amoroso, IEEE25分鐘
Required: “A Study of Advanced Persistent Threats,” Chen, Desmet, and Huygens30分鐘
Video: “IEEEtv – 5G Summit,” Ed Amoroso, Princeton, 201530分鐘
Suggested: Introduction to Cyber Security, Edward Amoroso and Matthew Amoroso, (Ch. 23 - 24)30分鐘
Quiz Directions5分鐘
Quiz2 個練習
Module 4 Quiz20分鐘
Select the Best Migration Choice:12分鐘
4.7
19 個審閱Chevron Right
工作福利

33%

通過此課程獲得實實在在的工作福利

熱門審閱

創建者 ASNov 5th 2018

Very good course providing basic knowledge for understanding the ways of cyber threat detections & mitigation so it is easier and more intuitive continuing exploration of the field by your own

創建者 DKAug 12th 2018

I used this course a refresh for established cyber skills, its been a welcome change to have such an enthusiastic lecturer and revisit some of the cornerstones of cyber.

講師

Avatar

Dr. Edward G. Amoroso

Research Professor, NYU and CEO, TAG Cyber LLC
Computer Science

關於 New York University Tandon School of Engineering

Tandon offers comprehensive courses in engineering, applied science and technology. Each course is rooted in a tradition of invention and entrepreneurship....

關於 Introduction to Cyber Security 專項課程

Introduction to Cyber Security was designed to help learners develop a deeper understanding of modern information and system protection technology and methods. The learning outcome is simple: We hope learners will develop a lifelong passion and appreciation for cyber security, which we are certain will help in future endeavors. Students, developers, managers, engineers, and even private citizens will benefit from this learning experience. Special customized interviews with industry partners were included to help connect the cyber security concepts to live business experiences....
Introduction to Cyber Security

常見問題

  • 注册以便获得证书后,您将有权访问所有视频、测验和编程作业(如果适用)。只有在您的班次开课之后,才可以提交和审阅同学互评作业。如果您选择在不购买的情况下浏览课程,可能无法访问某些作业。

  • 您注册课程后,将有权访问专项课程中的所有课程,并且会在完成课程后获得证书。您的电子课程证书将添加到您的成就页中,您可以通过该页打印您的课程证书或将其添加到您的领英档案中。如果您只想阅读和查看课程内容,可以免费旁听课程。

還有其他問題嗎?請訪問 學生幫助中心