We may earn an affiliate commission when you visit our partners.
Course image
Yin Pan, Jonathan Weissman, Tong Sun, Bo Yuan, and Jonathan S. Weissman

Gain the essential knowledge and expertise in network security and forensics needed for cybersecurity in enterprise environments.

Read more

Gain the essential knowledge and expertise in network security and forensics needed for cybersecurity in enterprise environments.

In this Cybersecurity MicroMasters program, you will learn:

  • Fundamentals of networks;
  • Systems administration;
  • How to protect computer networks and other systems by mitigating vulnerabilities and monitoring intrusions;
  • How to perform digital forensic analysis of cybercrime by gathering information on the nature and extent of the attack for presentation in a court of law, as well as assessing the extent of the damage to an organization;
  • Techniques of risk analysis;
  • Risk assessment and vulnerability assessment.

Share

Help others find MicroMasters from edX by sharing it with your friends and followers:

What's inside

Four courses

Cybersecurity Fundamentals

(88 hours)
In this introduction to cybersecurity, you will learn the fundamentals of computing security, including concepts, issues, and tools. You will also learn essential techniques for protecting systems and networks, analyzing threats, and implementing security solutions.

Computer Forensics

(88 hours)
Digital forensics investigates computer-related crimes to obtain evidence for court. This course covers principles and techniques for digital forensics investigation, including core procedures to ensure court admissibility of evidence, legal and ethical implications, and forensic procedures on Unix/Linux and Windows systems.

Cybersecurity Risk Management

(88 hours)
Cybersecurity risk management guides IT decisions. Cybersecurity risks impact overall IT risk modeling, assessment, and mitigation.

Network Security

(88 hours)
In this course, you will learn the principles and concepts of wired and wireless data network security. You will be guided through a series of laboratories and experiments to explore various mechanisms for securing data networks including physical layer mechanisms, filters, applications and encryption. You will analyze attack/defend scenarios and determine the effectiveness of particular defense deployments against attacks.

Learning objectives

  • How to setup and secure basic computer systems and networks
  • Information security risk management framework and methodologies
  • How to implement network security solutions and detect intrusions
  • How to conduct a digital forensics investigation admissible to a court

Save this collection

Save Cybersecurity to your list so you can find it easily later:
Save
Our mission

OpenCourser helps millions of learners each year. People visit us to learn workspace skills, ace their exams, and nurture their curiosity.

Our extensive catalog contains over 50,000 courses and twice as many books. Browse by search, by topic, or even by career interests. We'll match you to the right resources quickly.

Find this site helpful? Tell a friend about us.

Affiliate disclosure

We're supported by our community of learners. When you purchase or subscribe to courses and programs or purchase books, we may earn a commission from our partners.

Your purchases help us maintain our catalog and keep our servers humming without ads.

Thank you for supporting OpenCourser.

© 2016 - 2024 OpenCourser