课程信息
3,565 次近期查看

100% 在线

立即开始,按照自己的计划学习。

可灵活调整截止日期

根据您的日程表重置截止日期。

初级

完成时间大约为13 小时

建议:4 hours/week...

英语(English)

字幕:英语(English)
学习Course的学生是
  • Consultants
  • Engineers
  • Software Engineers

100% 在线

立即开始,按照自己的计划学习。

可灵活调整截止日期

根据您的日程表重置截止日期。

初级

完成时间大约为13 小时

建议:4 hours/week...

英语(English)

字幕:英语(English)

教学大纲 - 您将从这门课程中学到什么

1
完成时间为 5 小时

Identify and Analyze Malicious Code and Activity

18 个视频 (总计 109 分钟), 18 个阅读材料, 1 个测验
18 个视频
Malicious Code and Activity: Key Concepts6分钟
Malicious Code and Activity: Malicious Code Countermeasures4分钟
Malicious Code and Activity: Software Exploitation Methods6分钟
Malicious Code and Activity: Software Exploitation Methods5分钟
Malicious Code and Activity: Code Signing5分钟
Malicious Code and Activity: Social Engineering6分钟
Malicious Code and Activity: Security Awareness Training6分钟
Malicious Code and Activity: Long File Extensions5分钟
Malicious Code and Activity: E-mail7分钟
Malicious Code and Activity: Countermeasures5分钟
Malicious Code and Activity: Examples of Spoofing5分钟
Malicious Code and Activity: Techniques5分钟
Malicious Code and Activity: Botnet-Led Exploits6分钟
Malicious Code and Activity: Malicious Web Activity6分钟
Malicious Code and Activity: Zero-Day Exploits4分钟
Malicious Code and Activity: Infected Factory Builds and Media4分钟
Malicious Code and Activity: Inspection of Processes7分钟
18 个阅读材料
Systems and Application Security10分钟
Malicious Code and Activity: Key Concepts10分钟
Malicious Code and Activity: Malicious Code Countermeasures10分钟
Malicious Code and Activity: Software Exploitation Methods10分钟
Malicious Code and Activity: Software Exploitation Methods10分钟
Malicious Code and Activity: Code Signing10分钟
Malicious Code and Activity: Social Engineering10分钟
Malicious Code and Activity: Security Awareness Training10分钟
Malicious Code and Activity: Long File Extensions10分钟
Malicious Code and Activity: E-mail10分钟
Malicious Code and Activity: Countermeasures10分钟
Malicious Code and Activity: Examples of Spoofing10分钟
Malicious Code and Activity: Techniques10分钟
Malicious Code and Activity: Botnet-Led Exploits10分钟
Malicious Code and Activity: Malicious Web Activity10分钟
Malicious Code and Activity: Zero-Day Exploits10分钟
Malicious Code and Activity: Infected Factory Builds and Media10分钟
Malicious Code and Activity: Inspection of Processes10分钟
1 个练习
Quiz 120分钟
2
完成时间为 1 小时

Implement and Operate Endpoint Device Security

3 个视频 (总计 15 分钟), 3 个阅读材料, 1 个测验
3 个视频
Endpoint Device Security: Trusted Platform Module (TPM)6分钟
Endpoint Device Security: BYOD Policy Considerations2分钟
3 个阅读材料
Endpoint Device Security: HIDS10分钟
Endpoint Device Security: Trusted Platform Module (TPM)10分钟
Endpoint Device Security: BYOD Policy Considerations10分钟
1 个练习
Quiz 210分钟
3
完成时间为 5 小时

Operate and Configure Cloud Security

16 个视频 (总计 105 分钟), 16 个阅读材料, 1 个测验
16 个视频
Cloud Security: Hybrid5分钟
Cloud Security: Virtualization7分钟
Cloud Security: Hypervisor4分钟
Cloud Security: Country-Specific Legal Considerations6分钟
Cloud Security: P&DP Laws6分钟
Cloud Security:Application of Defined Controls for Personally Identifiable Information (PII)8分钟
Cloud Security: Data Dispersion5分钟
Cloud Security: Threat to Storage Types9分钟
Cloud Security: Technologies to Address Threats4分钟
Cloud Security: DLP Architecture7分钟
Cloud Security: Review Activity6分钟
Cloud Security: Key Storage in the Cloud4分钟
Cloud Security: Common Approaches for Data Masking4分钟
Cloud Security: Data Retention Policies7分钟
Cloud Security: Disposal Options8分钟
16 个阅读材料
Cloud Security: Five Essential Characteristics of Clouds10分钟
Cloud Security: Hybrid10分钟
Cloud Security: Virtualization10分钟
Cloud Security: Hypervisor10分钟
Cloud Security: Country-Specific Legal Considerations10分钟
Cloud Security: P&DP Laws10分钟
Cloud Security: Application of Defined Controls for Personally Identifiable Information (PII)10分钟
Cloud Security: Data Dispersion10分钟
Cloud Security: Threat to Storage Types10分钟
Cloud Security: Technologies to Address Threats10分钟
Cloud Security: DLP Architecture10分钟
Cloud Security: Review Activity10分钟
Cloud Security: Key Storage in the Cloud10分钟
Cloud Security: Common Approaches for Data Masking10分钟
Cloud Security: Data Retention Policies10分钟
Cloud Security: Disposal Options10分钟
1 个练习
Quiz 320分钟
4
完成时间为 3 小时

Secure Big Data Systems & Operate and Secure Virtual Environments

9 个视频 (总计 70 分钟), 9 个阅读材料, 1 个测验
9 个视频
Secure Big Data Systems: Interpreting Big Data4分钟
Secure Big data Systems: Key Challenges5分钟
Operate and Secure Virtual Environments: SDN5分钟
Operate and Secure Virtual Environments: Virtual Appliances8分钟
Operate and Secure Virtual Environments: DRS10分钟
Operate and Secure Virtual Environments: Common Attacks6分钟
Operate and Secure Virtual Environments: Network Security5分钟
Operate and Secure Virtual Environments: Virtual Machine Security16分钟
9 个阅读材料
Secure Big Data Systems: Big Data10分钟
Secure Big Data Systems: Interpreting Big Data10分钟
Secure Big data Systems: Key Challenges10分钟
Operate and Secure Virtual Environments: SDN10分钟
Operate and Secure Virtual Environments: Virtual Appliances10分钟
Operate and Secure Virtual Environments: DRS10分钟
Operate and Secure Virtual Environments: Common Attacks10分钟
Operate and Secure Virtual Environments: Network Security10分钟
Operate and Secure Virtual Environments: Virtual Machine Security10分钟
1 个练习
Quiz 412分钟
4.8
8 个审阅Chevron Right

来自Systems and Application Security的热门评论

创建者 DKMar 9th 2019

really worth attending this course, there is so much information available for security professionals. This course is adding weight to my skills and understanding of Cloud and Applications security.

创建者 GBJul 5th 2018

Thank you. Great course. The instructor breaks everything down, and makes it easy to learn.

讲师

Avatar

(ISC)² Education & Training

Education & Training

关于 (ISC)²

(ISC)² is an international nonprofit membership association focused on inspiring a safe and secure cyber world. Best known for the acclaimed Certified Information Systems Security Professional (CISSP®) certification, (ISC)2 offers a portfolio of credentials that are part of a holistic, programmatic approach to security. www.isc2.org ...

关于 (ISC)² Systems Security Certified Practitioner (SSCP)

Pursue better IT security job opportunities and prove knowledge with confidence. The SSCP Professional Training Certificate shows employers you have the IT security foundation to defend against cyber attacks – and puts you on a clear path to earning SSCP certification. Learn on your own schedule with 120-day access to content aligned with the latest (ISC)2 SSCP exam domains. We’re offering the complete online self-paced program for only $1,000 – a $200 savings when you get all domains bundled together. 3 Steps to Career Advancement 1. Register for the course 2. Gain access for 120 days 3. Register and sit for the SSCP certification exam Upon completing the SSCP Professional Certificate, you will: 1. Complete six courses of preparing you to sit for the Systems Security Certified Practitioner (SSCP) certification exam as outlined below. Course 1 - Access Controls Course 2 - Security Operations and Administration Course 3 - Risk Identification, Monitoring, and Analysis/Incident Response and Recovery Course 4 - Cryptography Course 5 - Network and Communication Security Course 6 - Systems and Application Security 2. Receive a certificate of program completion. 3. Understand how to implement, monitor and administer an organization’s IT infrastructure in accordance with security policies and procedures that ensure data confidentiality, integrity and availability....
(ISC)² Systems Security Certified Practitioner (SSCP)

常见问题

  • 是的,您可以在注册之前预览第一个视频和查看授课大纲。您必须购买课程,才能访问预览不包括的内容。

  • 如果您决定在班次开始日期之前注册课程,那么您将可以访问课程的所有课程视频和阅读材料。班次开始之后,您便可以提交作业。

  • 在您注册且班次开课之后,您将可以访问所有视频和其他资源,包括阅读材料内容和课程论坛。您将能够查看和提交练习作业,并完成所需的评分作业以获得成绩和课程证书。

  • 如果您成功完成课程,您的电子课程证书将添加到您的成就页中,您可以通过该页打印您的课程证书或将其添加到您的领英档案中。

  • 该课程是 Coursera 上提供的为数不多的课程之一,目前只对已购买课程或已获得助学金的学生开放。

  • The course schedule contains approximately 15 hours of content material covering lectures, reading materials, a case study, and quizzes broken up over the course of 7 weeks.

还有其他问题吗?请访问 学生帮助中心