We may earn an affiliate commission when you visit our partners.
Course image
Greg Williams

It seems anymore that you can't listen to the news without hearing of a data breach. You may have heard it said before that there are 2 types of companies out there, the ones who have been breached and those who will be breached. Defending against attackers who want to compromise assets can seem like an arduous task, but learning how attacks work and more importantly how to defend against those attacks can be very fulfilling. This specialization is designed to introduce you to practical computer security by teaching you the fundamentals of how you use security in the business world. This course is for those who want to understand how to defend computer systems and assets from attackers and other threats. It is also for those who want to understand how threats and attacks are carried out to help better defend their systems. This specialization is designed for senior business leaders to middle management and system administrators, so they can all speak the same language and get a better handle on their organization's security. Additionally, the course material may help you in passing some industry leading computer security examinations such as Security+ and CISSP.

Enroll now

Share

Help others find Specialization from Coursera by sharing it with your friends and followers:

What's inside

Four courses

Introduction to Cybersecurity for Business

The world runs on computers. This course provides a practical perspective on computer security, making it accessible to everyone. It covers topics such as website security, network security, and data breaches. By taking this course, you will gain a deeper understanding of computer security and be better equipped to protect your business.

Cyber Threats and Attack Vectors

Data breaches are a daily occurrence, affecting businesses of all sizes. This course examines the methods attackers use to gain access to systems and compromise data, providing insights into potential threats and attack vectors in today's environment. It aims to educate participants on how attacks are carried out, empowering them to identify and mitigate risks in their own systems and businesses.

Detecting and Mitigating Cyber Threats and Attacks

Computer attacks and data breaches are inevitable. This course examines detection and mitigation of threats and attack vectors, using tools and principles to protect information. By the end, you should be able to suggest detection and mitigation strategies for your systems or business.

Proactive Computer Security

I’ve heard this before – “I’m not sure my computer security practices are working”. I reply “Have you tested them?” This course is the fourth and final course in the Practical Computer Security specialization. In this course, you’ll learn how to proactively test your data protection measures.

Save this collection

Save Cybersecurity for Business to your list so you can find it easily later:
Save
Our mission

OpenCourser helps millions of learners each year. People visit us to learn workspace skills, ace their exams, and nurture their curiosity.

Our extensive catalog contains over 50,000 courses and twice as many books. Browse by search, by topic, or even by career interests. We'll match you to the right resources quickly.

Find this site helpful? Tell a friend about us.

Affiliate disclosure

We're supported by our community of learners. When you purchase or subscribe to courses and programs or purchase books, we may earn a commission from our partners.

Your purchases help us maintain our catalog and keep our servers humming without ads.

Thank you for supporting OpenCourser.

© 2016 - 2024 OpenCourser