Coursera
探索
  • 浏览
  • 搜索
  • 企业版
  • 登录
  • 注册

Introduction to Cyber Attacks

总览授课大纲常见问题解答制作方价格评分和审阅

主页计算机科学计算机安全和网络

Introduction to Cyber Attacks

New York University Tandon School of Engineering

关于此课程: This course provides learners with a baseline understanding of common cyber security threats, vulnerabilities, and risks. An overview of how basic cyber attacks are constructed and applied to real systems is also included. Examples include simple Unix kernel hacks, Internet worms, and Trojan horses in software utilities. Network attacks such as distributed denial of service (DDOS) and botnet- attacks are also described and illustrated using real examples from the past couple of decades. Familiar analytic models are outlined such as the confidentiality/integrity/availability (CIA) security threat framework, and examples are used to illustrate how these different types of threats can degrade real assets. The course also includes an introduction to basic cyber security risk analysis, with an overview of how threat-asset matrices can be used to prioritize risk decisions. Threats, vulnerabilities, and attacks are examined and mapped in the context of system security engineering methodologies.


制作方:  New York University Tandon School of Engineering
New York University Tandon School of Engineering

  • Dr. Edward G. Amoroso

    教学方:  Dr. Edward G. Amoroso, Research Professor, NYU and CEO, TAG Cyber LLC

    Computer Science
基本信息
课程 1(共 4 门,Introduction to Cyber Security Specialization )
级别Beginner
语言
English
如何通过通过所有计分作业以完成课程。
用户评分
4.7 星
平均用户评分 4.7查看学生的留言
授课大纲
第 1 周
Introduction to Cyber Security
This module provides exposure to basic cyber security concepts including some simple, foundational attack methods.
10 视频, 6 阅读材料
  1. 视频: Introduction: What You Will Learn from This Course on Cyber Security
  2. 视频: Assignments and Reading
  3. 视频: Hacking an Old-Fashioned Soda Machine
  4. 视频: Simple Worm Program
  5. 视频: Trojan Horse Login Program
  6. 视频: Malicious Compiler Program
  7. 视频: Typical Unix Kernel Attack
  8. 视频: Explaining Interview Series
  9. 视频: Welcome Lou Manousos (Part 1)
  10. 视频: Welcome Lou Manousos (Part 2)
  11. Reading: Required: Smashing the Stack for Fun and Profit,” Aleph One
  12. Reading: Required: “Reflections on Trusting Trust,” Ken Thompson
  13. Reading: Video: DEF CON 23
  14. Reading: Video: Kevin Mitnick | Talks at Google
  15. Reading: Suggested: Introduction to Cyber Security (Ch. 1-2)
  16. Reading: Suggested: TCP/IP Illustrated Volume 1 (2nd Ed.), (Ch. 1-2)
已评分: Module 1 Quiz
第 2 周
Understanding Basic Security Frameworks
This module introduces some fundamental frameworks, models, and approaches to cyber security including the CIA model.
17 视频, 6 阅读材料, 2 练习测试
  1. 视频: Assignments and Reading
  2. 视频: Purpose of Cyber Security
  3. 视频: Adversary Types
  4. 视频: Vulnerability Types
  5. 视频: Threat Types
  6. 视频: Matching Quiz
  7. Practice Quiz: Matching Quiz
  8. 视频: Matching Quiz Solution
  9. 视频: Confidentiality Threat
  10. 视频: Integrity Threat
  11. 视频: Availability Threat
  12. 视频: Fraud Threat
  13. Practice Quiz: Further Consideration - Fraud
  14. 视频: Testing for Vultnerabilities
  15. 视频: Attacks
  16. 视频: Brute Force vs. Hueristic Attacks
  17. 视频: Crytanalysis
  18. 视频: Cryptanalyzing Caesar Cipher
  19. 视频: Welcome Jose Dominguez
  20. Reading: Required: “Why Cryptosystems Fail,” Ross Anderson
  21. Reading: Required: “There Be Dragons,” Steve Bellovin
  22. Reading: Video: DMARC Whiteboard Session
  23. Reading: Video: Defcon 18
  24. Reading: Suggested: Introduction to Cyber Security, (Ch. 3 - 4)
  25. Reading: Suggested: TCP/IP Illustrated Volume 1 (2nd Ed.), (Ch. 3 – 4)
已评分: Module 2 Quiz
第 3 周
Examining Cyber Threats More Closely
This module covers some of the more intense attacks over the past decade including worms and DDOS attacks.
10 视频, 6 阅读材料, 1 练习测试
  1. 视频: Assignments and Reading
  2. 视频: SQL/ Slammer Worm of 2003
  3. 视频: Nachi Worm of 2003
  4. 视频: Botnet Design
  5. 视频: Botnet Arithmetic
  6. 视频: Welcome Elad Yoran
  7. 视频: Assets and Infrastructure
  8. 视频: Calculating Risk
  9. 视频: Making Security and Cost Decisions Based on Risk
  10. 视频: Threat Trees and Completeness of Analysis
  11. Practice Quiz: Further Consideration - Threat Trees
  12. Reading: Required: “Hackers Remotely Kill a Jeep on the Highway with Me in It,” Andy Greenberg, Wired Magazine
  13. Reading: Required: “A Hacker’s Evolution: Austin’s HD Moore Grew Up with Cybersecurity Industry,” 512 Tech
  14. Reading: Suggested: Introduction to Cyber Security (Ch. 5 - 6)
  15. Reading: Suggested: TCP/IP Illustrated Volume 1 (2nd Edition), (Ch. 5 - 6)
  16. Reading: Video: “Top Hacker Shows Us How It’s Done,” Pablos Holman, TEDx Midwest
  17. Reading: Video: “All Your Devices Can be Hacked,” Avi Rubin, TED Talk
已评分: Module 3 Quiz
第 4 周
Introducing Security Risk Analysis
This module introduces basic engineering and analysis methods for managing cyber security risk to valued assets.
8 视频, 8 阅读材料
  1. 视频: Assignments and Reading
  2. 视频: Mapping Assets to Threats
  3. 视频: Estimating Risk for Threat-Asset Pairs
  4. 视频: Example Case Study Matrix (Part 1)
  5. 视频: Example Case Study Matrix (Part 2)
  6. 视频: Example Case Study Matrix (Part 3)
  7. 视频: Mapping Assets, Threats, Vulnerabilities, and Attacks
  8. 视频: Welcome Nasir Memon
  9. Reading: Required: “A Man-in-the-Middle Attack on UMTS,” Meyer and Wetzel
  10. Reading: Required: “Are Computer Hacker Break-Ins Ethical?” Eugene Spafford
  11. Reading: Video: “What’s Wrong With Your Password,” Lorrie Faith Cranor, TED Talk
  12. Reading: Video: “Fighting Viruses, Defending the Net,” Mikko Hypponen, TED Talk
  13. Reading: Suggested: Introduction to Cyber Security, (Ch. 7 - 8)
  14. Reading: Suggested: TCP/IP Illustrated Volume 1 (2nd Ed.), (Ch. 7 – 8)
  15. Reading: Project Description
  16. Reading: Additional Self-Learning Opportunities
已评分: Module 4 Quiz
已评分: Final Quiz - What level of security risk do you estimate for the following threat-asset matrix entries for the ACME Software Company:

常见问题解答
运作方式
Coursework
Coursework

Each course is like an interactive textbook, featuring pre-recorded videos, quizzes and projects.

Help from Your Peers
Help from Your Peers

Connect with thousands of other learners and debate ideas, discuss course material, and get help mastering concepts.

Certificates
Certificates

Earn official recognition for your work, and share your success with friends, colleagues, and employers.

制作方
New York University Tandon School of Engineering
Tandon offers comprehensive courses in engineering, applied science and technology. Each course is rooted in a tradition of invention and entrepreneurship.
价格
购买课程
访问课程材料

可用

访问评分的材料

可用

收到最终成绩

可用

获得可共享的课程证书

可用

评分和审阅
已评分 4.7,总共 5 个 193 评分

Ks

osm introduction

SM

Dr. Edward G. Amoroso is a refreshingly clear thinker, clear communicator, and very engaging presenter. When he talks, he has something meaningful to say. His examples are clear and memorable. And his opinions and rational for his approach to cybersecurity is always clearly justified and sensible. This is proving to be the best class I have found on cybersecurity, without comparison. Thank you!

Muhammad Imtiaz Alam

Quizes are very tough :/

JB

Excellent presentation, examples and course content



您可能也喜欢
University of Colorado System
Detecting and Mitigating Cyber Threats and Attacks
1 门课程
University of Colorado System
Detecting and Mitigating Cyber Threats and Attacks
查看课程
University of Colorado System
Proactive Computer Security
1 门课程
University of Colorado System
Proactive Computer Security
查看课程
University of Colorado System
Cyber Threats and Attack Vectors
1 门课程
University of Colorado System
Cyber Threats and Attack Vectors
查看课程
New York University Tandon School of Engineering
Real-Time Cyber Threat Detection and Mitigation
1 门课程
New York University Tandon School of Engineering
Real-Time Cyber Threat Detection and Mitigation
查看课程
New York University Tandon School of Engineering
Cyber Attack Countermeasures
1 门课程
New York University Tandon School of Engineering
Cyber Attack Countermeasures
查看课程
Coursera
Coursera 致力于普及全世界最好的教育,它与全球一流大学和机构合作提供在线课程。
© 2018 Coursera Inc. 保留所有权利。
通过 App Store 下载通过 Google Play 获取
  • Coursera
  • 关于
  • 管理团队
  • 工作机会
  • 目录
  • 证书
  • 学位
  • 商务
  • 政府版
  • 社区
  • 合作伙伴
  • 社区助教
  • 专业译员
  • 开发者
  • Beta 测试人员
  • 连接
  • 博客
  • Facebook
  • 领英
  • Twitter
  • Google+
  • 技术博客
  • 更多
  • 条款
  • 隐私
  • 帮助
  • 内容访问
  • 媒体
  • 联系我们
  • 目录
  • 附属公司