About this 專項課程
100% 在線課程

100% 在線課程

立即開始,按照自己的計劃學習。
靈活的計劃

靈活的計劃

設置並保持靈活的截止日期。
初級

初級

完成時間(小時)

完成時間大約為4 個月

建議 4 小時/週
可選語言

英語(English)

字幕:英語(English)...

您將獲得的技能

CybersecurityInformation Security (INFOSEC)Risk AssessmentAttack Surface
100% 在線課程

100% 在線課程

立即開始,按照自己的計劃學習。
靈活的計劃

靈活的計劃

設置並保持靈活的截止日期。
初級

初級

完成時間(小時)

完成時間大約為4 個月

建議 4 小時/週
可選語言

英語(English)

字幕:英語(English)...

How the 專項課程 Works

加入課程

Coursera 專項課程是幫助您掌握一門技能的一系列課程。若要開始學習,請直接註冊專項課程,或預覽專項課程並選擇您要首先開始學習的課程。當您訂閱專項課程的部分課程時,您將自動訂閱整個專項課程。您可以只完成一門課程,您可以隨時暫停學習或結束訂閱。訪問您的學生面板,跟踪您的課程註冊情況和進度。

實踐項目

每個專項課程都包括實踐項目。您需要成功完成這個(些)項目才能完成專項課程並獲得證書。如果專項課程中包括單獨的實踐項目課程,則需要在開始之前完成其他所有課程。

獲得證書

在結束每門課程並完成實踐項目之後,您會獲得一個證書,您可以向您的潛在雇主展示該證書並在您的職業社交網絡中分享。

how it works

此專項課程包含 4 門課程

課程1

Introduction to Cybersecurity for Business

4.7
189 個評分
53 個審閱
The world runs computers. From small to large businesses, from the CEO down to level 1 support staff, everyone uses computers. This course is designed to give you a practical perspective on computer security. This course approaches computer security in a way that anyone can understand. Ever wonder how your bank website is secure when you connect to it? Wonder how other business owners secure their network? Wonder how large data breaches happen? This is practical computer security. It will help you answer the question – what should I focus on?...
課程2

Cyber Threats and Attack Vectors

4.6
115 個評分
29 個審閱
Data breaches occur nearly every day. From very large retailers, down to your fantasy football website, and anywhere in between, they have been compromised in some way. How did the attackers get in? What did they do with the data they compromised? What should I be concerned with in my own business or my systems? This course is the second course in the Practical Computer Security. It will discuss types of threats and attack vectors commonly seen in today’s environment. I hate to be the bearer of bad news, but threats are all over the place! This course isn’t designed to insight fear that there is no hope for keeping systems and business secure, but rather educate you on how attacks are carried out so that you have a better sense of what to look out for in your business or with your systems....
課程3

Detecting and Mitigating Cyber Threats and Attacks

4.8
81 個評分
14 個審閱
Computer attacks and data breaches are inevitable. It seems like every day a data breach occurs and the victims of the data breach suffer. Their information is stolen or posted online. The company’s or businesses who had the breach go on, learn a little from the attack, and just give credit monitoring out as if nothing happened. What if you could help prevent a data breach in your organization? This is the third course in the Practical Computer Security specialization. This course looks at detection and mitigation of threats and attack vectors and discusses how to use tools and principles to protect information. By the end of the course you should be able to make suggestions on what type of detection and mitigation strategy is right for your systems or business given the known threats and attack vectors. You should be able to discuss what features you want in a firewall, or how cash registers or sensitive data systems should be secured. The project at the end of the course will allow you to apply what you have learned to argue what type of detection and mitigation strategies should have been employed by companies and businesses that have suffered a data breach....
課程4

Proactive Computer Security

4.7
50 個評分
14 個審閱
I’ve heard this before – “I’m not sure my computer security practices are working”. I reply “Have you tested them?” This course is the fourth and final course in the Practical Computer Security specialization. In this course, you’ll learn how to proactively test what you have put in place to protect your data. In the first week you’ll be able to discuss the basics of deterrents and how to “trick” attackers into believing they’ve hit a goldmine of data away from your real systems. In week 2, you’ll be able to understand and discuss the steps of penetration testing methodology. In week 3, you will be able to understand and apply what you have learned on your own systems to test whether your systems are secure or not. In week 4, we’ll discuss planning for your own methodology that you can apply to your own systems. And finally in week 5, we’ll finish up with a project that will allow you to test your skills in a safe environment....

講師

Avatar

Greg Williams

Lecturer
Department of Computer Science

關於 University of Colorado System

The University of Colorado is a recognized leader in higher education on the national and global stage. We collaborate to meet the diverse needs of our students and communities. We promote innovation, encourage discovery and support the extension of knowledge in ways unique to the state of Colorado and beyond....

常見問題

  • 可以!点击您感兴趣的课程卡开始注册即可。注册并完成课程后,您可以获得可共享的证书,或者您也可以旁听该课程免费查看课程资料。如果您订阅的课程是某专项课程的一部分,系统会自动为您订阅完整的专项课程。访问您的学生面板,跟踪您的进度。

  • 此课程完全在线学习,无需到教室现场上课。您可以通过网络或移动设备随时随地访问课程视频、阅读材料和作业。

  • 此专项课程不提供大学学分,但部分大学可能会选择接受专项课程证书作为学分。查看您的合作院校了解详情。

  • The course within the specialization can be accomplished in 4-5 weeks with each week being 3-4 hours of study. If you have hands on experience with some of the concepts, you may be able to shorten the time spent on learning.

  • This is an introductory specialization. Learners will learn the fundamentals of many aspects of system management.

  • No, you do not have to take the courses in a specific order, however, key concepts are introduced in order.

還有其他問題嗎?請訪問 學生幫助中心