We may earn an affiliate commission when you visit our partners.
Course image
Dr. Edward G. Amoroso

Introduction to Cyber Security was designed to help learners develop a deeper understanding of modern information and system protection technology and methods. The learning outcome is simple: We hope learners will develop a lifelong passion and appreciation for cyber security, which we are certain will help in future endeavors. Students, developers, managers, engineers, and even private citizens will benefit from this learning experience. Special customized interviews with industry partners were included to help connect the cyber security concepts to live business experiences.

Enroll now

Share

Help others find Specialization from Coursera by sharing it with your friends and followers:

What's inside

Four courses

Introduction to Cyber Attacks

This course provides learners with a baseline understanding of common cyber security threats, vulnerabilities, and risks. An overview of how basic cyber attacks are constructed and applied to real systems is also included.

Cyber Attack Countermeasures

This course introduces the basics of cyber defense, starting with foundational models such as Bell-LaPadula and information flow frameworks. These underlying policy enforcement mechanisms help introduce basic functional protections, starting with authentication methods. Learners will be introduced to a series of different authentication solutions and protocols, including RSA SecureID and Kerberos, in the context of a canonical schema.

Real-Time Cyber Threat Detection and Mitigation

This course introduces real-time cyber security techniques and methods in the context of the TCP/IP protocol suites. Explanation of some basic TCP/IP security hacks is used to introduce the need for network security solutions such as stateless and stateful firewalls.

Enterprise and Infrastructure Security

This course introduces advanced and current topics in cyber security, relevant to enterprise and infrastructure settings. It covers enterprise compliance frameworks, hybrid cloud architectures, emerging security issues in blockchain, blinding algorithms, IoT, and critical infrastructure protection. Mobile security, cloud security hyper-resilience approaches, and career planning in cyber security are also discussed.

Learning objectives

  • Summarize the main purpose of cyber security as a discipline
  • Summarize the basics of identification and authentication in cyber security
  • Explain the pros and cons of security through obscurity
  • Develop a lifelong learning plan for potential careers in cyber security

Save this collection

Save Introduction to Cyber Security to your list so you can find it easily later:
Save
Our mission

OpenCourser helps millions of learners each year. People visit us to learn workspace skills, ace their exams, and nurture their curiosity.

Our extensive catalog contains over 50,000 courses and twice as many books. Browse by search, by topic, or even by career interests. We'll match you to the right resources quickly.

Find this site helpful? Tell a friend about us.

Affiliate disclosure

We're supported by our community of learners. When you purchase or subscribe to courses and programs or purchase books, we may earn a commission from our partners.

Your purchases help us maintain our catalog and keep our servers humming without ads.

Thank you for supporting OpenCourser.

© 2016 - 2024 OpenCourser