What Does a Network Security Engineer Do?
October 24, 2024
Article
Cultivate your career with expert-led programs, job-ready certificates, and 10,000 ways to grow. All for $25/month, billed annually. Save now
Defend Your Cloud from Cyberattacks. Detect and block hackers with off-the-shelf cyber-defenses
Instructor: Rick Smith
6,670 already enrolled
Included with
(77 reviews)
Recommended experience
Beginner level
Familiarity with computer systems, software, and the Internet. See the FAQ below for additional details.
(77 reviews)
Recommended experience
Beginner level
Familiarity with computer systems, software, and the Internet. See the FAQ below for additional details.
Add to your LinkedIn profile
Add this credential to your LinkedIn profile, resume, or CV
Share it on social media and in your performance review
This Specialization introduces cybersecurity to novice software developers. It presents essential security concepts and how they apply to cloud deployments. Learners develop proficiency at assessing cloud vulnerabilities and attack reports. They also dive into cloud provider documentation to apply available features to classic cybersecurity risks.
Applied Learning Project
Learners assess cloud vulnerabilities and attack reports in the context of US national documentation standards. They also become familiar with cloud provider documentation and how to apply available security measures to major cloud cybersecurity risks.
Design a simple cloud service and select appropriate security measures to protect it.
Associate user roles with appropriate entities deploying or using a cloud service.
Assess levels of risk and recent vulnerabilities that apply to cloud services.
Learn and apply basic network security techniques in the cloud environment.
How to analyze a data breach and trace it back to the vulnerability that made it possible.
How data security and privacy requirements arise from legal obligations and industry standards.
After completing the course, the student should be able to do the following:
● List and describe the OWASP Top 10 vulnerabilities. ● Identify methods to provide cloud security assurance as part of the development life cycle, e.g. in a continuous delivery environment. ● List and describe the different types of virtualization or sandboxing used to protect cloud applications at either the server or client. ● Describe the application of authentication factors and federated identity solutions in cloud client and server authentication. ● Given a cloud application, explain where and how the necessary crypto keys, passwords, and other security secrets should be stored and distributed.
After completing the course, the student should be able to do the following:
● Associate lists of OWASP Top Ten Risks with major cloud cybersecurity risks. ● Apply appropriate cryptographic techniques to secure authentication mechanisms and cloud data. ● Identify the most effective strategies for resisting injection attacks, cross-site scripting attacks, and object deserialization attacks. ● Assess strategies to address risks posed by administrative failures, including misconfiguration, broken access control, vulnerable software components, and security monitoring.
The University of Minnesota is among the largest public research universities in the country, offering undergraduate, graduate, and professional students a multitude of opportunities for study and research. Located at the heart of one of the nation’s most vibrant, diverse metropolitan communities, students on the campuses in Minneapolis and St. Paul benefit from extensive partnerships with world-renowned health centers, international corporations, government agencies, and arts, nonprofit, and public service organizations.
Unlimited access to 10,000+ world-class courses, hands-on projects, and job-ready certificate programs - all included in your subscription
Earn a degree from world-class universities - 100% online
Upskill your employees to excel in the digital economy
Sixteen (16) weeks: each course is scheduled over a 4-week period. Some students may complete some weeks faster, depending on availability of peer review.
The course is intended for cybersecurity novices. Learners must be familiar with the following:
Major hardware and software components of their computer
The role of backups and updates
The distinction between a 'local' network and the public Internet
Experience writing simple software programs or scripts
The courses are designed to be taken in this order:
Cloud Security Basics
Cloud Data Security
Cloud Application Security
Top Ten Cloud Risks*
If learners take the courses in a different order, they will encounter topics that are explained in the earlier courses.
* The Top Ten Cloud Risks course may be taken by itself if the learner already knows cybersecurity fundamentals and, in particular, how the major risks manifest themselves in the cloud environment.
The University of Minnesota's Software Engineering Center offers an in-person graduate program in which you may be able to take the course for credit.
You will develop proficiency at assessing cloud vulnerabilities and attack reports in the context of US national documentation standards. You will also learn to navigate cloud provider documentation and apply available features to classic cybersecurity risks.
This course is completely online, so there’s no need to show up to a classroom in person. You can access your lectures, readings and assignments anytime and anywhere via the web or your mobile device.
If you subscribed, you get a 7-day free trial during which you can cancel at no penalty. After that, we don’t give refunds, but you can cancel your subscription at any time. See our full refund policy.
Yes! To get started, click the course card that interests you and enroll. You can enroll and complete the course to earn a shareable certificate, or you can audit it to view the course materials for free. When you subscribe to a course that is part of a Specialization, you’re automatically subscribed to the full Specialization. Visit your learner dashboard to track your progress.
Yes. In select learning programs, you can apply for financial aid or a scholarship if you can’t afford the enrollment fee. If fin aid or scholarship is available for your learning program selection, you’ll find a link to apply on the description page.
When you enroll in the course, you get access to all of the courses in the Specialization, and you earn a certificate when you complete the work. If you only want to read and view the course content, you can audit the course for free. If you cannot afford the fee, you can apply for financial aid.
Financial aid available,
Learn on your own time from top universities and businesses.
Already on Coursera?
Having trouble logging in? Learner help center
This site is protected by reCAPTCHA Enterprise and the Google Privacy Policy and Terms of Service apply.