课程信息
4.7
132 个评分
14 个审阅
专项课程

第 3 门课程(共 4 门)

100% 在线

100% 在线

立即开始,按照自己的计划学习。
可灵活调整截止日期

可灵活调整截止日期

根据您的日程表重置截止日期。
中级

中级

完成时间(小时)

完成时间大约为11 小时

建议:10 hours/week...
可选语言

英语(English)

字幕:英语(English)
专项课程

第 3 门课程(共 4 门)

100% 在线

100% 在线

立即开始,按照自己的计划学习。
可灵活调整截止日期

可灵活调整截止日期

根据您的日程表重置截止日期。
中级

中级

完成时间(小时)

完成时间大约为11 小时

建议:10 hours/week...
可选语言

英语(English)

字幕:英语(English)

教学大纲 - 您将从这门课程中学到什么

1
完成时间(小时)
完成时间为 5 小时

Basic Network Security

This module introduces the basics of TCP/IP for security, including firewall design and use....
Reading
13 个视频 (总计 71 分钟), 5 个阅读材料, 1 个测验
Video13 个视频
Assignments and Reading2分钟
Security Through Obscurity4分钟
TCP/IP Evolution and Security6分钟
TCP/IP Overview8分钟
IP Spoofing5分钟
TCP Sequence Number Attack5分钟
Packet Flooding5分钟
Packet Sniffing5分钟
SYN Packets for Access Control5分钟
Definition of a Firewall5分钟
Firewall: Stateful versus Stateless5分钟
Interview: John Viega8分钟
Reading5 个阅读材料
Required: “Network Firewalls,” Steve Bellovin and Bill Cheswick30分钟
Required: “Introduction to TCP/IP Network Attacks,” Guang Yang45分钟
Video: “Hacking DNS,” Eli the Computer Guy46分钟
Suggested: Introduction to Cyber Security, Edward Amoroso and Matthew Amoroso, (Ch. 17 - 18)30分钟
Suggested: TCP/IP Illustrated Volume 1 (2nd Edition), Kevin Fall and W. Richard Stevens, (Ch. 17 – 18)30分钟
Quiz1 个练习
Module 1 Quiz20分钟
2
完成时间(小时)
完成时间为 3 小时

More Advanced Network Security Technologies

This module introduces packet filters, firewall rule sets, proxies, and additional network security methods....
Reading
12 个视频 (总计 65 分钟), 4 个阅读材料, 1 个测验
Video12 个视频
Packet Filtering7分钟
Sample Packet Filtering and Reference Architecture5分钟
Default Firewall Block4分钟
Firewall Rules to Allow Outbound Web Browsing4分钟
Firewall Rules to Allow Telnet and Other TCP Services3分钟
Establishing Corporate Policy Rules4分钟
FTP Protocol6分钟
Firewall Rules for FTP3分钟
Application Proxy Filtering6分钟
Forward and Reverse Proxies4分钟
Interview: Roger Piqueras Jover11分钟
Reading4 个阅读材料
Required: “Anomaly-based Network Intrusion Detection: Techniques, Systems, and Challenges.”20分钟
Required: “Intrusion Detection via Static Analysis,” Wagner and Dean25分钟
Video: “How Does Intrusion Prevention Systems Work,” 2013 - SourceFire6分钟
Suggested: Introduction to Cyber Security, Edward Amoroso and Matthew Amoroso, (Chapters 19 - 20)30分钟
Quiz1 个练习
Module 2 Quiz20分钟
3
完成时间(小时)
完成时间为 3 小时

Network Security Architectures

This module introduces the foundations firewall architectures, intrusion detection, and SOC design....
Reading
11 个视频 (总计 68 分钟), 4 个阅读材料, 1 个测验
Video11 个视频
Firewall Architectures (Part 1)6分钟
Firewall Architectures (Part 2)6分钟
Management by Exception5分钟
System Auditing6分钟
Basics of Intrusion Detection7分钟
Signature Versus Behavioral Detection5分钟
IDS Versus IPS6分钟
Design of SIEM5分钟
Design of a SOC6分钟
Interview: Dino Dai Zovi9分钟
Reading4 个阅读材料
Required: “An Evening with Berferd,” Bill Cheswick20分钟
Required: “IDES Model,” Dorothy Denning30分钟
Video: “DEFCAMP 2015 – Building a Security Operations Center,”32分钟
Suggested: Introduction to Cyber Security, Edward Amoroso and Matthew Amoroso, (Ch. 21 - 22)30分钟
Quiz1 个练习
Module 3 Quiz20分钟
4
完成时间(小时)
完成时间为 4 小时

Enterprise Network Security

This module introduces the limitations of perimeters, and the challenges in the enterprise of dealing with threats such as DDOS and APT....
Reading
12 个视频 (总计 70 分钟), 5 个阅读材料, 2 个测验
Video12 个视频
Practical Limitations of Perimeter7分钟
APT Schema Through Perimeter Holes6分钟
Third Party Security5分钟
Target APT Attack5分钟
Large Government Agency Attack5分钟
Layer 3 DDOS Protection6分钟
Layer 7 Application Level DDOS Risk3分钟
Large Financial Website DDOS Attacks4分钟
Network Security Industry Overview2分钟
Interview: Ray Cheng - Pt. 113分钟
Interview: Ray Cheng - Pt. 26分钟
Reading5 个阅读材料
Required: “From the Enterprise Perimeter to Mobility Enabled Cloud,” Ed Amoroso, IEEE25分钟
Required: “A Study of Advanced Persistent Threats,” Chen, Desmet, and Huygens30分钟
Video: “IEEEtv – 5G Summit,” Ed Amoroso, Princeton, 201530分钟
Suggested: Introduction to Cyber Security, Edward Amoroso and Matthew Amoroso, (Ch. 23 - 24)30分钟
Quiz Directions5分钟
Quiz2 个练习
Module 4 Quiz20分钟
Select the Best Migration Choice:12分钟
4.7
14 个审阅Chevron Right

热门审阅

创建者 ASNov 5th 2018

Very good course providing basic knowledge for understanding the ways of cyber threat detections & mitigation so it is easier and more intuitive continuing exploration of the field by your own

创建者 DKAug 12th 2018

I used this course a refresh for established cyber skills, its been a welcome change to have such an enthusiastic lecturer and revisit some of the cornerstones of cyber.

讲师

Avatar

Dr. Edward G. Amoroso

Research Professor, NYU and CEO, TAG Cyber LLC
Computer Science

关于 New York University Tandon School of Engineering

Tandon offers comprehensive courses in engineering, applied science and technology. Each course is rooted in a tradition of invention and entrepreneurship....

关于 Introduction to Cyber Security 专项课程

Introduction to Cyber Security was designed to help learners develop a deeper understanding of modern information and system protection technology and methods. The learning outcome is simple: We hope learners will develop a lifelong passion and appreciation for cyber security, which we are certain will help in future endeavors. Students, developers, managers, engineers, and even private citizens will benefit from this learning experience. Special customized interviews with industry partners were included to help connect the cyber security concepts to live business experiences....
Introduction to Cyber Security

常见问题

  • 注册以便获得证书后,您将有权访问所有视频、测验和编程作业(如果适用)。只有在您的班次开课之后,才可以提交和审阅同学互评作业。如果您选择在不购买的情况下浏览课程,可能无法访问某些作业。

  • 您注册课程后,将有权访问专项课程中的所有课程,并且会在完成课程后获得证书。您的电子课程证书将添加到您的成就页中,您可以通过该页打印您的课程证书或将其添加到您的领英档案中。如果您只想阅读和查看课程内容,可以免费旁听课程。

还有其他问题吗?请访问 学生帮助中心