Prepares students for a role as a network security administrator and analyst. Topics include viruses, worms, other attack mechanisms, vulnerabilities and countermeasures, network security protocols, encryption, identity and authentication, scanning, firewalls, security tools, and organizations addressing security. A component of this course is a self-contained team project that, if the student wishes, can be extended into a full operational security system in a follow-course.
Expérience recommandée
Compétences que vous acquerrez
- Catégorie : Cyber Security
- Catégorie : Data Security
- Catégorie : Network Security
- Catégorie : Cyber Security Management
- Catégorie : Governance Risk Management And Compliance
Détails à connaître
Ajouter à votre profil LinkedIn
octobre 2024
32 devoirs
Découvrez comment les employés des entreprises prestigieuses maîtrisent des compétences recherchées
Obtenez un certificat professionnel
Ajoutez cette qualification à votre profil LinkedIn ou à votre CV
Partagez-le sur les réseaux sociaux et dans votre évaluation de performance
Il y a 9 modules dans ce cours
Welcome to Cyber Security Technologies! This module offers a comprehensive foundation for understanding the dynamic field of cyber security. Students will explore various career pathways within cyber security, gaining insights into the roles, responsibilities, and skills required. This module also delves into current trends affecting the cyber landscape and provides an overview of information security principles, including risk management strategies. Through this exploration, studnets will be equipped with the knowledge to navigate and contribute to the field of cyber security effectively.
Inclus
12 vidéos6 lectures4 devoirs2 sujets de discussion
In Module 2, learners will delve into the core principles of access control, understanding how proper implementation can strengthen system security. This module includes creating basic Bash scripts, offering practical skills for system administration tasks. Additionally, students will learn to apply the guidelines of the NIST Special Publication 800 Series, ensuring compliance with industry-standard security practices. This module is designed to equip learners with the technical expertise for managing access control and enhancing security through scripting and regulatory frameworks.
Inclus
10 vidéos5 lectures4 devoirs1 sujet de discussion
Module 3 provides an in-depth look at the foundational elements that make up security architecture, enabling learners to evaluate the structure and behavior of secure systems. Students will also assess the effectiveness of the NIST 800-53 security controls, gaining the ability to apply these guidelines to protect information systems. Additionally, this module covers the unique security considerations inherent in virtualization technology, offering insights into how to maintain robust security in increasingly virtualized environments. This module provides students with the evaluative skills necessary to design and critique security architectures within a variety of technological contexts.
Inclus
8 vidéos5 lectures4 devoirs1 sujet de discussion
Module 4 offers a deep dive into the critical, often overlooked aspects of security that go beyond the digital realm. Learners will acquire the knowledge to apply fundamental physical security measures, understanding the vital role these play in comprehensive security strategy. This module also explores the environmental factors that impact security, from natural disasters to climate control, and evaluates the technologies — from biometrics to surveillance systems — that are employed to enhance physical security measures. Through this module, students will be equipped to assess and improve the physical and environmental security aspects of various organizations.
Inclus
9 vidéos5 lectures4 devoirs1 sujet de discussion
Module 5 provides an essential exploration of the strategies and tools necessary for protecting both private and enterprise networks. Students will delve into the basics of network security, gaining the skills to analyze vulnerabilities and implement effective security measures. This module further details the intricacies of securing telecommunications systems, including an evaluation of various network security protocols, ensuring that learners are prepared to address the challenges presented by the diverse array of communication technologies in use today.
Inclus
8 vidéos5 lectures4 devoirs1 sujet de discussion
Module 6 demystifies the complex world of cryptography, providing learners with a clear understanding of its fundamental principles and the pivotal role it plays in securing information. Students will critically evaluate various cryptographic algorithms, from classic ciphers to cutting-edge public-key cryptosystems, to understand their applications and limitations. This module provides opportunities to create practical applications of cryptography, giving learners valuable experience in employing cryptographic techniques to real-world security challenges.
Inclus
6 vidéos5 lectures4 devoirs1 sujet de discussion
Module 7 equips learners with the skills to ensure that organizations can continue operating in the face of disruptions and quickly recover from any form of disaster. Through detailed exploration, students will grasp the core principles of business continuity planning and delve into analyzing various disaster recovery strategies, understanding their applicability and effectiveness. Additionally, this module offers a deep dive into the critical processes of risk assessment and management, enabling learners to identify potential threats and devise operational responses that minimize impact and facilitate swift recovery.
Inclus
9 vidéos5 lectures4 devoirs1 sujet de discussion
Module 8 offers an in-depth look at the complex landscape of laws and regulations shaping the cybersecurity domain. Students will explore a wide spectrum of legal and regulatory issues, gaining an understanding of how these frameworks impact both individuals and organizations in the field of cybersecurity. Moreover, this module dives into the analysis of different compliance frameworks, equipping learners with the knowledge to navigate and adhere to various global and regional regulations, thereby ensuring that cybersecurity practices meet legal obligations and industry standards.
Inclus
9 vidéos4 lectures3 devoirs1 sujet de discussion
This module contains the summative course assessment that has been designed to evaluate your understanding of the course material and assess your ability to apply the knowledge you have acquired throughout the course.
Inclus
1 devoir
Instructeur
Offert par
Recommandé si vous êtes intéressé(e) par Computer Security and Networks
University of Colorado System
University of London
Préparer un diplôme
Ce site cours fait partie du (des) programme(s) diplômant(s) suivant(s) proposé(s) par Illinois Tech. Si vous êtes admis et que vous vous inscrivez, les cours que vous avez suivis peuvent compter pour l'apprentissage de votre diplôme et vos progrès peuvent être transférés avec vous.¹
Pour quelles raisons les étudiants sur Coursera nous choisissent-ils pour leur carrière ?
Ouvrez de nouvelles portes avec Coursera Plus
Accès illimité à 10,000+ cours de niveau international, projets pratiques et programmes de certification prêts à l'emploi - tous inclus dans votre abonnement.
Faites progresser votre carrière avec un diplôme en ligne
Obtenez un diplôme auprès d’universités de renommée mondiale - 100 % en ligne
Rejoignez plus de 3 400 entreprises mondiales qui ont choisi Coursera pour les affaires
Améliorez les compétences de vos employés pour exceller dans l’économie numérique
Foire Aux Questions
Access to lectures and assignments depends on your type of enrollment. If you take a course in audit mode, you will be able to see most course materials for free. To access graded assignments and to earn a Certificate, you will need to purchase the Certificate experience, during or after your audit. If you don't see the audit option:
The course may not offer an audit option. You can try a Free Trial instead, or apply for Financial Aid.
The course may offer 'Full Course, No Certificate' instead. This option lets you see all course materials, submit required assessments, and get a final grade. This also means that you will not be able to purchase a Certificate experience.
When you purchase a Certificate you get access to all course materials, including graded assignments. Upon completing the course, your electronic Certificate will be added to your Accomplishments page - from there, you can print your Certificate or add it to your LinkedIn profile. If you only want to read and view the course content, you can audit the course for free.
You will be eligible for a full refund until two weeks after your payment date, or (for courses that have just launched) until two weeks after the first session of the course begins, whichever is later. You cannot receive a refund once you’ve earned a Course Certificate, even if you complete the course within the two-week refund period. See our full refund policy.