关于此 专项课程
100% 在线课程

100% 在线课程

立即开始,按照自己的计划学习。
灵活的计划

灵活的计划

设置并保持灵活的截止日期。
初级

初级

Some familiarity with IT management and concepts.

完成时间(小时)

完成时间大约为2 个月

建议 8 小时/周
可选语言

英语(English)

字幕:英语(English)...

您将学到的内容有

  • Check

    Summarize the main purpose of cyber security as a discipline

  • Check

    Summarize the basics of identification and authentication in cyber security

  • Check

    Explain the pros and cons of security through obscurity

  • Check

    Develop a lifelong learning plan for potential careers in cyber security

您将获得的技能

CryptographyCybersecurityRisk AssessmentCyber DefenseCyber Attacks
100% 在线课程

100% 在线课程

立即开始,按照自己的计划学习。
灵活的计划

灵活的计划

设置并保持灵活的截止日期。
初级

初级

Some familiarity with IT management and concepts.

完成时间(小时)

完成时间大约为2 个月

建议 8 小时/周
可选语言

英语(English)

字幕:英语(English)...

专项课程 的运作方式

加入课程

Coursera 专项课程是帮助您掌握一门技能的一系列课程。若要开始学习,请直接注册专项课程,或预览专项课程并选择您要首先开始学习的课程。当您订阅专项课程的部分课程时,您将自动订阅整个专项课程。您可以只完成一门课程,您可以随时暂停学习或结束订阅。访问您的学生面板,跟踪您的课程注册情况和进度。

实践项目

每个专项课程都包括实践项目。您需要成功完成这个(些)项目才能完成专项课程并获得证书。如果专项课程中包括单独的实践项目课程,则需要在开始之前完成其他所有课程。

获得证书

在结束每门课程并完成实践项目之后,您会获得一个证书,您可以向您的潜在雇主展示该证书并在您的职业社交网络中分享。

how it works

此专项课程包含 4 门课程

课程1

Introduction to Cyber Attacks

4.7
447 个评分
109 个审阅
This course provides learners with a baseline understanding of common cyber security threats, vulnerabilities, and risks. An overview of how basic cyber attacks are constructed and applied to real systems is also included. Examples include simple Unix kernel hacks, Internet worms, and Trojan horses in software utilities. Network attacks such as distributed denial of service (DDOS) and botnet- attacks are also described and illustrated using real examples from the past couple of decades. Familiar analytic models are outlined such as the confidentiality/integrity/availability (CIA) security threat framework, and examples are used to illustrate how these different types of threats can degrade real assets. The course also includes an introduction to basic cyber security risk analysis, with an overview of how threat-asset matrices can be used to prioritize risk decisions. Threats, vulnerabilities, and attacks are examined and mapped in the context of system security engineering methodologies....
课程2

Cyber Attack Countermeasures

4.8
139 个评分
28 个审阅
This course introduces the basics of cyber defense starting with foundational models such as Bell-LaPadula and information flow frameworks. These underlying policy enforcements mechanisms help introduce basic functional protections, starting with authentication methods. Learners will be introduced to a series of different authentication solutions and protocols, including RSA SecureID and Kerberos, in the context of a canonical schema.   The basics of cryptography are also introduced with attention to conventional block ciphers as well as public key cryptography. Important cryptographic techniques such as cipher block chaining and triple-DES are explained. Modern certification authority-based cryptographic support is also discussed and shown to provide basis for secure e-commerce using Secure Sockets Layer (SSL) schemes....
课程3

Real-Time Cyber Threat Detection and Mitigation

4.7
132 个评分
14 个审阅
This course introduces real-time cyber security techniques and methods in the context of the TCP/IP protocol suites. Explanation of some basic TCP/IP security hacks is used to introduce the need for network security solutions such as stateless and stateful firewalls. Learners will be introduced to the techniques used to design and configure firewall solutions such as packet filters and proxies to protect enterprise assets. Perimeter solutions such as firewalls and intrusion prevention systems are shown to have significant drawbacks in common enterprise environments. The result of such weakness is shown to often exist as advanced persistent threats (APTs) from nation-state actors. Such attacks, as well as DDOS and third-party attacks, are shown to have potential solutions for modern enterprise....
课程4

Enterprise and Infrastructure Security

4.6
101 个评分
21 个审阅
This course introduces a series of advanced and current topics in cyber security, many of which are especially relevant in modern enterprise and infrastructure settings. The basics of enterprise compliance frameworks are provided with introduction to NIST and PCI. Hybrid cloud architectures are shown to provide an opportunity to fix many of the security weaknesses in modern perimeter local area networks.   Emerging security issues in blockchain, blinding algorithms, Internet of Things (IoT), and critical infrastructure protection are also described for learners in the context of cyber risk. Mobile security and cloud security hyper-resilience approaches are also introduced. The course completes with some practical advice for learners on how to plan careers in cyber security....

讲师

Avatar

Dr. Edward G. Amoroso

Research Professor, NYU and CEO, TAG Cyber LLC
Computer Science

关于 New York University Tandon School of Engineering

Tandon offers comprehensive courses in engineering, applied science and technology. Each course is rooted in a tradition of invention and entrepreneurship....

常见问题

  • 可以!点击您感兴趣的课程卡开始注册即可。注册并完成课程后,您可以获得可共享的证书,或者您也可以旁听该课程免费查看课程资料。如果您订阅的课程是某专项课程的一部分,系统会自动为您订阅完整的专项课程。访问您的学生面板,跟踪您的进度。

  • 此课程完全在线学习,无需到教室现场上课。您可以通过网络或移动设备随时随地访问课程视频、阅读材料和作业。

  • 此专项课程不提供大学学分,但部分大学可能会选择接受专项课程证书作为学分。查看您的合作院校了解详情。

  • No, you can take them in any order. You can also take more than one at a time.

还有其他问题吗?请访问 学生帮助中心