课程信息
7,613 次近期查看

Learner Career Outcomes

56%

完成这些课程后已开始新的职业生涯

50%

通过此课程获得实实在在的工作福利

20%

加薪或升职

第 4 门课程(共 4 门)

100% 在线

立即开始,按照自己的计划学习。

可灵活调整截止日期

根据您的日程表重置截止日期。

中级

完成时间大约为9 小时

建议:13 hours/week...

英语(English)

字幕:英语(English)

Learner Career Outcomes

56%

完成这些课程后已开始新的职业生涯

50%

通过此课程获得实实在在的工作福利

20%

加薪或升职

第 4 门课程(共 4 门)

100% 在线

立即开始,按照自己的计划学习。

可灵活调整截止日期

根据您的日程表重置截止日期。

中级

完成时间大约为9 小时

建议:13 hours/week...

英语(English)

字幕:英语(English)

教学大纲 - 您将从这门课程中学到什么

1
完成时间为 4 小时

Security Awareness, Compliance, Assessments, and Risk

12 个视频 (总计 66 分钟), 5 个阅读材料, 1 个测验
12 个视频
Assignments and Reading2分钟
Social Engineering5分钟
Phishing7分钟
Security Awareness4分钟
Using Video for Security Awareness1分钟
Security Assessment and Audit4分钟
What is GRC?9分钟
NIST Framework Overview4分钟
PCI-DSS Framework Overview5分钟
Challenges of Compliance versus Security5分钟
Welcome Roger Thornton (Part 1): CTO, AlienVault12分钟
5 个阅读材料
Video: Welcome to Ataata2分钟
Required: “Framework for Improving Critical Infrastructure Cybersecurity,” Version 1.0, NIST, Feb 12, 2014.1小时
Video: “Addressing the Challenges of Complying with the Payment Card Industry Data Security Standard,” HALOCK Security Labs – Introduction to PCI Compliance11分钟
Video: “Closing Keynote – The Past, Present, and Future of Integrated GRC,” French Caldwell, MetricStream33分钟
Suggested: Introduction to Cyber Security, Edward Amoroso and Matthew Amoroso, eBook available online (Chapters 25 - 26)1小时
1 个练习
Module 1 Quiz20分钟
2
完成时间为 3 小时

Hybrid Cloud Security

10 个视频 (总计 56 分钟), 2 个阅读材料, 1 个测验
10 个视频
Enterprise Shift to Hybrid Cloud6分钟
Workload Micro-Segmentation6分钟
Defense in Depth through Micro-Segmentation4分钟
Cloud Access Security Brokers4分钟
Advanced Hybrid Cloud Security Architecture (Part 1)6分钟
Advanced Hybrid Cloud Security Architecture (Part 2)4分钟
Advanced Hybrid Cloud Security Architecture (Part 3)3分钟
Security of Isolated Servers (Outside Perimeter)4分钟
Welcome John Popolizio: Founder, Riverdale Group13分钟
2 个阅读材料
Required: “Practical Methods for Securing the Cloud,” IEEE, Ed Amoroso, 201420分钟
Suggested: Introduction to Cyber Security, Edward Amoroso and Matthew Amoroso, eBook available online (Chapters 27 - 28)1小时
1 个练习
Module 2 Quiz20分钟
3
完成时间为 4 小时

Blockchain, Anonymity, and Critical Infrastructure Protection

10 个视频 (总计 77 分钟), 4 个阅读材料, 1 个测验
10 个视频
Hashing Algorithms7分钟
Blockchain - Part 16分钟
Blockchain - Part 29分钟
Cyber Attribution7分钟
Onion Routing and Tor8分钟
Chaum Binding Algorithm9分钟
Critical Infrastructure - Part 1 - Requirements7分钟
Critical Infrastructure - Part 2 - Protection Methods8分钟
Welcome Roger Thornton (Part 2): CTO, AlienVault9分钟
4 个阅读材料
Required: “Bitcoin: A Peer-to-Peer Electronic Cash System,” S. Nakamoto20分钟
Required: “Common Threats and Vulnerabilities of Critical Infrastructures,” Robles, Choi, Cho, Kim, Park, and Lee, Dongseo University, Korea. International Journal of Control and Automation.15分钟
Video: “HDIAC Critical Infrastructure Protection Webinar,” Benjamin Ruddell, Arizona State University, 201542分钟
Suggested: Introduction to Cyber Security, Edward Amoroso and Matthew Amoroso, eBook available online (Chapters 29 - 30)1小时
1 个练习
Module 3 Quiz20分钟
4
完成时间为 3 小时

Mobility Security and Deception

9 个视频 (总计 47 分钟), 5 个阅读材料, 2 个测验
9 个视频
Mobility Security9分钟
IMSI Catching5分钟
IoT Security6分钟
IoT Botnets3分钟
Using Deception and Honey Pots for Security5分钟
Welcome Elena Kvochko, Cyber Security Expert7分钟
Advice on Careers in Cyber Security5分钟
How to Continue a Learning Plan in Cyber Security2分钟
5 个阅读材料
Required: “Anonymous Connections and Onion Routing,” Michael Reed, Paul Syverson, and David Goldschlag, onion-router.net.25分钟
Required: “Cyber Security Deception,” Mohammed Almeshekah and Eugene Spafford, Springer.com50分钟
Video: “Kevin Mahaffey – Lookout – Mobile Security,”22分钟
Project Description10分钟
Additional Self-Study10分钟
2 个练习
Module 4 Quiz20分钟
Multiple Choice Questions16分钟
4.7
44 条评论Chevron Right

来自Enterprise and Infrastructure Security的热门评论

创建者 WCApr 23rd 2018

Prof. Ed presented wonderful courses in cyber security . He always can explain the complicated thing in a easy way and bring the cut-edge technology to the students . Bravo ! Prof. Ed

创建者 ZZSep 3rd 2018

Very Interesting . Course information was very well laid out & helped understand quickly without much difficulty. My proficiency level is Beginner in Cyber Security

讲师

Avatar

Dr. Edward G. Amoroso

Research Professor, NYU and CEO, TAG Cyber LLC
Computer Science

关于 纽约大学坦登工程学院

Tandon offers comprehensive courses in engineering, applied science and technology. Each course is rooted in a tradition of invention and entrepreneurship....

关于 Introduction to Cyber Security 专项课程

Introduction to Cyber Security was designed to help learners develop a deeper understanding of modern information and system protection technology and methods. The learning outcome is simple: We hope learners will develop a lifelong passion and appreciation for cyber security, which we are certain will help in future endeavors. Students, developers, managers, engineers, and even private citizens will benefit from this learning experience. Special customized interviews with industry partners were included to help connect the cyber security concepts to live business experiences....
Introduction to Cyber Security

常见问题

  • 注册以便获得证书后,您将有权访问所有视频、测验和编程作业(如果适用)。只有在您的班次开课之后,才可以提交和审阅同学互评作业。如果您选择在不购买的情况下浏览课程,可能无法访问某些作业。

  • 您注册课程后,将有权访问专项课程中的所有课程,并且会在完成课程后获得证书。您的电子课程证书将添加到您的成就页中,您可以通过该页打印您的课程证书或将其添加到您的领英档案中。如果您只想阅读和查看课程内容,可以免费旁听课程。

还有其他问题吗?请访问 学生帮助中心