關於此 專項課程
16,079 次近期查看

100% 在線課程

立即開始,按照自己的計劃學習。

靈活的計劃

設置並保持靈活的截止日期。

初級

Some familiarity with IT management and concepts.

完成時間大約為2 個月

建議 9 小時/週

英語(English)

字幕:英語(English)

您將學到的內容有

  • Check

    Summarize the main purpose of cyber security as a discipline

  • Check

    Summarize the basics of identification and authentication in cyber security

  • Check

    Explain the pros and cons of security through obscurity

  • Check

    Develop a lifelong learning plan for potential careers in cyber security

您將獲得的技能

CryptographyCybersecurityRisk AssessmentCyber DefenseCyber Attacks

100% 在線課程

立即開始,按照自己的計劃學習。

靈活的計劃

設置並保持靈活的截止日期。

初級

Some familiarity with IT management and concepts.

完成時間大約為2 個月

建議 9 小時/週

英語(English)

字幕:英語(English)

專項課程 的運作方式

加入課程

Coursera 專項課程是幫助您掌握一門技能的一系列課程。若要開始學習,請直接註冊專項課程,或預覽專項課程並選擇您要首先開始學習的課程。當您訂閱專項課程的部分課程時,您將自動訂閱整個專項課程。您可以只完成一門課程,您可以隨時暫停學習或結束訂閱。訪問您的學生面板,跟踪您的課程註冊情況和進度。

實踐項目

每個專項課程都包括實踐項目。您需要成功完成這個(些)項目才能完成專項課程並獲得證書。如果專項課程中包括單獨的實踐項目課程,則需要在開始之前完成其他所有課程。

獲得證書

在結束每門課程並完成實踐項目之後,您會獲得一個證書,您可以向您的潛在雇主展示該證書並在您的職業社交網絡中分享。

how it works

此專項課程包含 4 門課程

課程1

Introduction to Cyber Attacks

4.7
685 個評分
162 個審閱

This course provides learners with a baseline understanding of common cyber security threats, vulnerabilities, and risks. An overview of how basic cyber attacks are constructed and applied to real systems is also included. Examples include simple Unix kernel hacks, Internet worms, and Trojan horses in software utilities. Network attacks such as distributed denial of service (DDOS) and botnet- attacks are also described and illustrated using real examples from the past couple of decades. Familiar analytic models are outlined such as the confidentiality/integrity/availability (CIA) security threat framework, and examples are used to illustrate how these different types of threats can degrade real assets. The course also includes an introduction to basic cyber security risk analysis, with an overview of how threat-asset matrices can be used to prioritize risk decisions. Threats, vulnerabilities, and attacks are examined and mapped in the context of system security engineering methodologies.

...
課程2

Cyber Attack Countermeasures

4.8
234 個評分
39 個審閱

This course introduces the basics of cyber defense starting with foundational models such as Bell-LaPadula and information flow frameworks. These underlying policy enforcements mechanisms help introduce basic functional protections, starting with authentication methods. Learners will be introduced to a series of different authentication solutions and protocols, including RSA SecureID and Kerberos, in the context of a canonical schema.   The basics of cryptography are also introduced with attention to conventional block ciphers as well as public key cryptography. Important cryptographic techniques such as cipher block chaining and triple-DES are explained. Modern certification authority-based cryptographic support is also discussed and shown to provide basis for secure e-commerce using Secure Sockets Layer (SSL) schemes.

...
課程3

Real-Time Cyber Threat Detection and Mitigation

4.7
219 個評分
22 個審閱

This course introduces real-time cyber security techniques and methods in the context of the TCP/IP protocol suites. Explanation of some basic TCP/IP security hacks is used to introduce the need for network security solutions such as stateless and stateful firewalls. Learners will be introduced to the techniques used to design and configure firewall solutions such as packet filters and proxies to protect enterprise assets. Perimeter solutions such as firewalls and intrusion prevention systems are shown to have significant drawbacks in common enterprise environments. The result of such weakness is shown to often exist as advanced persistent threats (APTs) from nation-state actors. Such attacks, as well as DDOS and third-party attacks, are shown to have potential solutions for modern enterprise.

...
課程4

Enterprise and Infrastructure Security

4.7
173 個評分
33 個審閱

This course introduces a series of advanced and current topics in cyber security, many of which are especially relevant in modern enterprise and infrastructure settings. The basics of enterprise compliance frameworks are provided with introduction to NIST and PCI. Hybrid cloud architectures are shown to provide an opportunity to fix many of the security weaknesses in modern perimeter local area networks.   Emerging security issues in blockchain, blinding algorithms, Internet of Things (IoT), and critical infrastructure protection are also described for learners in the context of cyber risk. Mobile security and cloud security hyper-resilience approaches are also introduced. The course completes with some practical advice for learners on how to plan careers in cyber security.

...

講師

Avatar

Dr. Edward G. Amoroso

Research Professor, NYU and CEO, TAG Cyber LLC
Computer Science

關於 纽约大学坦登工程学院

Tandon offers comprehensive courses in engineering, applied science and technology. Each course is rooted in a tradition of invention and entrepreneurship....

常見問題

  • 可以!点击您感兴趣的课程卡开始注册即可。注册并完成课程后,您可以获得可共享的证书,或者您也可以旁听该课程免费查看课程资料。如果您订阅的课程是某专项课程的一部分,系统会自动为您订阅完整的专项课程。访问您的学生面板,跟踪您的进度。

  • 此课程完全在线学习,无需到教室现场上课。您可以通过网络或移动设备随时随地访问课程视频、阅读材料和作业。

  • 此专项课程不提供大学学分,但部分大学可能会选择接受专项课程证书作为学分。查看您的合作院校了解详情。

  • No, you can take them in any order. You can also take more than one at a time.

還有其他問題嗎?請訪問 學生幫助中心