We may earn an affiliate commission when you visit our partners.
Course image
Jonathan Weissman, Gang Qu, Jennifer Golbeck, Michael Hicks, Jonathan Katz, and Jonathan S. Weissman
The Cybersecurity Specialization covers the fundamental concepts underlying the construction of secure systems, from the hardware to the software to the human-computer interface, with the use of cryptography to secure interactions. These concepts are...
Read more
The Cybersecurity Specialization covers the fundamental concepts underlying the construction of secure systems, from the hardware to the software to the human-computer interface, with the use of cryptography to secure interactions. These concepts are illustrated with examples drawn from modern practice, and augmented with hands-on exercises involving relevant tools and techniques. Successful participants will develop a way of thinking that is security-oriented, better understanding how to think about adversaries and how to build systems that defend against them.
Enroll now

Share

Help others find this collection page by sharing it with your friends and followers:

What's inside

Six courses

Hardware Security

In this course, we will explore hardware security and trust. Students will gain an understanding of vulnerabilities in digital system design and physical attacks on these systems. They will learn the importance of security in hardware design and become familiar with tools and skills for building secure and trusted hardware.

Usable Security

(0 hours)
This course focuses on designing and building secure systems with a human-centric focus. We will examine basic principles of human-computer interaction and apply these insights to the design of secure systems. Our goal is to develop security measures that respect human performance and their goals within a system.

Software Security

(0 hours)
This course explores the foundations of software security, considering important software vulnerabilities and attacks that exploit them, and defenses that prevent or mitigate these attacks. We take a "build security in" mentality, considering techniques at each phase of the development cycle that can be used to strengthen the security of software systems.

Cybersecurity Capstone Project

(0 hours)
This intensive course challenges students to build a secure software system and identify flaws in other students' projects.

Cryptography

(0 hours)
This course provides an introduction to the principles of modern cryptography, with an emphasis on practical applications.

Cybersecurity Fundamentals

(88 hours)
In this introduction to cybersecurity, you will learn the fundamentals of computing security, including concepts, issues, and tools. You will also learn essential techniques for protecting systems and networks, analyzing threats, and implementing security solutions.

Save this collection

Save Cybersecurity to your list so you can find it easily later:
Save
Our mission

OpenCourser helps millions of learners each year. People visit us to learn workspace skills, ace their exams, and nurture their curiosity.

Our extensive catalog contains over 50,000 courses and twice as many books. Browse by search, by topic, or even by career interests. We'll match you to the right resources quickly.

Find this site helpful? Tell a friend about us.

Affiliate disclosure

We're supported by our community of learners. When you purchase or subscribe to courses and programs or purchase books, we may earn a commission from our partners.

Your purchases help us maintain our catalog and keep our servers humming without ads.

Thank you for supporting OpenCourser.

© 2016 - 2024 OpenCourser