This course aims to help anyone interested in data science understand the cybersecurity risks and the tools/techniques that can be used to mitigate those risks. We will cover the distinctions between confidentiality, integrity, and availability, introduce learners to relevant cybersecurity tools and techniques including cryptographic tools, software resources, and policies that will be essential to data science. We will explore key tools and techniques for authentication and access control so producers, curators, and users of data can help ensure the security and privacy of the data.
Cybersecurity for Data Science
This course is part of Vital Skills for Data Science Specialization
Instructor: Al Pisano
Sponsored by Louisiana Workforce Commission
4,096 already enrolled
(24 reviews)
Recommended experience
What you'll learn
Characterize the CIA principles and use them to classify a variety of cyber scenarios.
Identify and disseminate vulnerabilities in the data security space- social (human) and technical (digital).
Distinguish ethical boundaries of hacking and its applications.
Explore professional cybersecurity networks and connect with experts from the field.
Details to know
Add to your LinkedIn profile
1 quiz, 3 assignments
See how employees at top companies are mastering in-demand skills
Build your subject-matter expertise
- Learn new concepts from industry experts
- Gain a foundational understanding of a subject or tool
- Develop job-relevant skills with hands-on projects
- Earn a shareable career certificate
Earn a career certificate
Add this credential to your LinkedIn profile, resume, or CV
Share it on social media and in your performance review
There are 5 modules in this course
In this module, you will learn the basics of cybersecurity and the CIA triad.
What's included
4 videos7 readings1 assignment1 discussion prompt
In this module, you will explore your Cyber Story and examine your pubic data profile
What's included
3 videos5 readings1 assignment1 peer review
This module explores the world of hacking, IoT and social engineering.
What's included
3 videos4 readings1 assignment
This session students will leverage social media to connect with cybersecurity experts and explore the ethics around cybersecurity and data.
What's included
2 videos4 readings1 quiz
You will connect with a cybersecurity expert , interview the contact, submit the text, audio or video of the interview and reflect on the experience and knowledge gained.
What's included
3 videos5 readings1 peer review
Instructor
Offered by
Why people choose Coursera for their career
Learner reviews
24 reviews
- 5 stars
45.83%
- 4 stars
16.66%
- 3 stars
4.16%
- 2 stars
16.66%
- 1 star
16.66%
Showing 3 of 24
Reviewed on Oct 3, 2022
The homeworks were interesting and allowed us to learn and apply it in a creative manner
Reviewed on Mar 6, 2023
It is a very good and enjoyable course. I have learnt a lot of things related to cyber security.
Reviewed on Jun 25, 2024
Learned many aspects of Cybersecurity. Opened my mind into how to make sure not become a cyber victim.
Recommended if you're interested in Information Technology
Campus BBVA
Board Infinity
EIT Digital
Open new doors with Coursera Plus
Unlimited access to 10,000+ world-class courses, hands-on projects, and job-ready certificate programs - all included in your subscription
Advance your career with an online degree
Earn a degree from world-class universities - 100% online
Join over 3,400 global companies that choose Coursera for Business
Upskill your employees to excel in the digital economy