Learners will identify risks and learn how to protect systems given real world system architectures. Learners will also use their knowledge to assess real world data breaches to determine what threats and exploits caused the data breaches and also what defense mechanisms would have prevented the breaches. Finally, learners will use the proactive security knowledge they gained to exploit a live system to show the risks of insecure web applications.
Cybersecurity for Business 專項課程
Discover the practical side of computer security。 Identify what threatens your business and master how to practically defend against those threats.
It seems anymore that you can't listen to the news without hearing of a data breach. You may have heard it said before that there are 2 types of companies out there, the ones who have been breached and those who will be breached. Defending against attackers who want to compromise assets can seem like an arduous task, but learning how attacks work and more importantly how to defend against those attacks can be very fulfilling. This specialization is designed to introduce you to practical computer security by teaching you the fundamentals of how you use security in the business world. This course is for those who want to understand how to defend computer systems and assets from attackers and other threats. It is also for those who want to understand how threats and attacks are carried out to help better defend their systems. This specialization is designed for senior business leaders to middle management and system administrators, so they can all speak the same language and get a better handle on their organization's security. Additionally, the course material may help you in passing some industry leading computer security examinations such as Security+ and CISSP.
- Beginner Specialization.
- No prior experience required.
第 1 門課程
Introduction to Cybersecurity for Business
課程概述The world runs computers. From small to large businesses, from the CEO down to level 1 support staff, everyone uses computers. This course is designed to give you a practical perspective on computer security. This course approaches computer securi
第 2 門課程
Cyber Threats and Attack Vectors
課程概述Data breaches occur nearly every day. From very large retailers, down to your fantasy football website, and anywhere in between, they have been compromised in some way. How did the attackers get in? What did they do with the data they compromised? What s
第 3 門課程
Detecting and Mitigating Cyber Threats and Attacks
課程概述Computer attacks and data breaches are inevitable. It seems like every day a data breach occurs and the victims of the data breach suffer. Their information is stolen or posted online. The company’s or businesses who had the breach go on, learn a l
第 4 門課程
Proactive Computer Security
課程概述I’ve heard this before – “I’m not sure my computer security practices are working”. I reply “Have you tested them?” This course is the fourth and final course in the Practical Computer Security specialization. In this course, you’ll learn h
More questions? Visit the Learner Help Center.