We may earn an affiliate commission when you visit our partners.
Maurice E. Dawson

Prepares students for a role as a network security administrator and analyst. Topics include viruses, worms, other attack mechanisms, vulnerabilities and countermeasures, network security protocols, encryption, identity and authentication, scanning, firewalls, security tools, and organizations addressing security. A component of this course is a self-contained team project that, if the student wishes, can be extended into a full operational security system in a follow-course.

Upon successful completion of this course, students will be able to:

- Describe foundational concepts in cybersecurity.

Read more

Prepares students for a role as a network security administrator and analyst. Topics include viruses, worms, other attack mechanisms, vulnerabilities and countermeasures, network security protocols, encryption, identity and authentication, scanning, firewalls, security tools, and organizations addressing security. A component of this course is a self-contained team project that, if the student wishes, can be extended into a full operational security system in a follow-course.

Upon successful completion of this course, students will be able to:

- Describe foundational concepts in cybersecurity.

- Apply access control and scripting techniques.

- Design and implement secure architechtures.

- Integrate physical and environmental security measures.

- Secure telecommunications and network systems.

- Implement cryptographic solutions.

- Develop business continuity and disaster recovery plans.

- Navigate legal, regulatory, and compliance requirements.

Enroll now

What's inside

Syllabus

Module 1: Introduction to Cyber Security
Welcome to Cyber Security Technologies! This module offers a comprehensive foundation for understanding the dynamic field of cyber security. Students will explore various career pathways within cyber security, gaining insights into the roles, responsibilities, and skills required. This module also delves into current trends affecting the cyber landscape and provides an overview of information security principles, including risk management strategies. Through this exploration, studnets will be equipped with the knowledge to navigate and contribute to the field of cyber security effectively.
Read more

Traffic lights

Read about what's good
what should give you pause
and possible dealbreakers
Covers viruses, worms, and attack mechanisms, which are essential knowledge for identifying and mitigating threats in network environments
Explores network security protocols, encryption, and firewalls, which are critical components for securing network infrastructure and data transmission
Includes a team project that can be extended into a full operational security system, providing hands-on experience in developing and implementing security solutions
Examines legal, regulatory, and compliance requirements, which are crucial for understanding the legal and ethical considerations in cybersecurity
Requires familiarity with NIST Special Publication 800 Series, which may require additional self-study for those unfamiliar with these guidelines
Teaches Bash scripting, which may require learners to have access to a Linux or Unix-like environment to practice and implement the scripts effectively

Save this course

Create your own learning path. Save this course to your list so you can find it easily later.
Save

Reviews summary

Comprehensive cyber security foundation overview

Learners say this course offers an excellent foundation in cybersecurity, covering a wide range of topics from basic principles to legal aspects, making it highly relevant for professional roles and career changers. The modules are well-structured and provide a good map of the cybersecurity landscape. However, some students note that while the breadth is a major plus, the course sometimes lacks depth in specific areas. Several reviews mention it can be too theoretical and doesn't provide enough practical, hands-on labs needed for real-world job skills, feeling more like a survey for those with prior experience. Some content, particularly in physical security, is perceived as outdated or less current.
Excellent starting point for beginners.
"This course provides an excellent foundation in cybersecurity."
"Exactly what I needed to get started in cybersecurity. The foundational concepts were explained very clearly."
"Excellent course for laying a broad foundation. The modules are well-structured..."
"Recommended for anyone looking to start a career in cybersecurity..."
Comprehensive overview of cybersecurity topics.
"This course provides an excellent foundation in cybersecurity. The modules cover a wide range of topics, from basic principles to legal aspects."
"A solid introduction to the field. It covers a lot of ground, which is great for breadth..."
"...gives a great overview of the entire field. Recommended for career changers."
"Provides a very wide scope of cybersecurity topics. Useful for understanding the different areas within the field."
Some topics may not feel current.
"Some modules felt a bit outdated, especially the physical security part."
"Physical security felt a bit out of place among the other technical modules..."
"...physical security and older legal/compliance sections felt a bit dry or less current."
Best suited for complete beginners.
"The course is okay, but definitely aimed at complete beginners. As someone with some prior IT experience, I found much of the early content too simplistic."
"...the course didn't push me much beyond what I already knew. Needs more advanced options or tracks."
"I felt some topics like cryptography could have gone into more detail... The scripting module was a bit basic..."
Too theoretical, needs more hands-on labs.
"The course is too theoretical and doesn't provide enough practical, hands-on labs needed for real-world skills."
"Poor quality... The lack of challenging, real-world exercises makes this course not very useful for career development."
"Decent course for theory, but falls short on practical application... if you want to learn how to actually *do* security tasks..., this isn't the course."
Broad but superficial coverage in some areas.
"...sometimes lacks depth in specific areas. The labs were helpful, but I felt some topics like cryptography could have gone into more detail."
"Felt like a survey course rather than something that prepares you for a job."
"Don't expect to become an expert in any single area. Crypto module was interesting but high-level."
"Expected more technical depth."

Activities

Be better prepared before your course. Deepen your understanding during and after it. Supplement your coursework and achieve mastery of the topics covered in Cyber Security Technologies with these activities:
Review Networking Fundamentals
Reinforce your understanding of networking concepts before diving into network security protocols and architectures.
Browse courses on Networking Fundamentals
Show steps
  • Review the OSI model and TCP/IP suite.
  • Practice subnetting and IP addressing.
  • Familiarize yourself with common network devices.
Read 'Security Engineering' by Ross Anderson
Gain a deeper understanding of security engineering principles and practices to inform your approach to cybersecurity technologies.
Show steps
  • Read the chapters related to network security and cryptography.
  • Take notes on key concepts and examples.
  • Reflect on how the concepts apply to real-world scenarios.
Practice Bash Scripting Exercises
Sharpen your scripting skills to automate security tasks and improve efficiency in system administration.
Show steps
  • Find online resources with Bash scripting exercises.
  • Write scripts to automate common tasks.
  • Test and debug your scripts thoroughly.
Four other activities
Expand to see all activities and additional details
Show all seven activities
Write a Blog Post on a Recent Cyber Attack
Deepen your understanding of current threats and vulnerabilities by researching and writing about a recent cyber attack.
Show steps
  • Research a recent cyber attack.
  • Analyze the attack and its impact.
  • Write a blog post summarizing your findings.
Set up a Honeypot
Gain hands-on experience with security tools and techniques by setting up a honeypot to attract and analyze malicious activity.
Show steps
  • Research different honeypot solutions.
  • Choose a honeypot solution and install it.
  • Configure the honeypot and monitor its activity.
  • Analyze the data collected by the honeypot.
Read 'Practical Cryptography' by Niels Ferguson and Bruce Schneier
Enhance your understanding of cryptography and its applications in cybersecurity.
Show steps
  • Read the chapters related to cryptographic algorithms and protocols.
  • Take notes on key concepts and examples.
  • Experiment with different cryptographic tools and techniques.
Develop a Disaster Recovery Plan
Apply your knowledge of business continuity and disaster recovery to create a comprehensive plan for a hypothetical organization.
Show steps
  • Choose a hypothetical organization.
  • Conduct a risk assessment.
  • Develop a business continuity plan.
  • Develop a disaster recovery plan.
  • Test and refine your plan.

Career center

Learners who complete Cyber Security Technologies will develop knowledge and skills that may be useful to these careers:
Network Security Administrator
A network security administrator is responsible for maintaining the security of an organization's computer networks. This includes implementing and monitoring security measures, responding to security incidents, and ensuring that the network infrastructure is secure against threats. This course provides a comprehensive overview of network security principles and practices, covering areas such as network protocols, encryption, firewalls, vulnerabilities, and countermeasures. The course's focus on designing and implementing secure architectures, securing telecommunications and network systems, and implementing cryptographic solutions directly aligns with the responsibilities of a network security administrator which makes the course highly relevant for anyone seeking this role.
Security Analyst
The role of a security analyst is to monitor and analyze security events in order to identify potential threats and vulnerabilities. They are also responsible for developing security policies and procedures and for conducting security risk assessments. This course is highly applicable for a security analyst, given it provides a strong foundation in cyber security concepts, including a comprehensive exploration of vulnerabilities, countermeasures, and attack mechanisms. The inclusion of topics such as access control, physical security, and legal compliance further equips a security analyst with a broad range of knowledge to effectively identify, analyze, and mitigate risks.
Information Security Analyst
An information security analyst focuses on protecting an organization's sensitive data and systems from unauthorized access and cyber threats. Their job includes tasks such as developing security policies, monitoring security systems, and responding to security incidents. This course will prepare someone for such a role, as it delves into core cybersecurity topics like risk management, cryptography, network security, and access control. The course’s coverage of business continuity and disaster recovery planning is also vital for an information security analyst, giving them skills to ensure that systems stay online during disasters.
Cybersecurity Consultant
A cybersecurity consultant advises organizations on how to improve their security posture. They assess security risks, recommend security solutions, and help implement security policies and procedures. This course can be very helpful for a cybersecurity consultant since it covers many security topics such as attack mechanisms, access control, secure architecture and design, which are critical for assessing risks and recommending security solutions. The course's exploration of legal, regulatory, and compliance requirements ensures a cybersecurity consultant has a well-rounded understanding of the challenges and needs of organizations.
Security Engineer
Security engineers are responsible for building and maintaining secure systems and networks. They design, implement, and test security mechanisms and protocols. This course is particularly relevant for a security engineer as it provides training in secure architecture and design, cryptographic solutions, and implementation of network security systems. Furthermore, the course’s emphasis on integrating physical and environmental security measures ensures a security engineer has a holistic view of security that can be applied to various technical infrastructure challenges.
Incident Responder
An incident responder is responsible for managing and mitigating security incidents when they occur. They are involved in identifying, containing, and recovering from security breaches. This course is suited for an incident responder with its teachings in cybersecurity concepts, attack mechanisms, and security tool usage, enabling quick assessment and response to incidents. Additionally, the course's emphasis on business continuity and disaster recovery planning equips an incident responder to develop effective strategies to minimize the impact of incidents.
Vulnerability Analyst
A vulnerability analyst identifies and assesses security weaknesses in systems and networks. They conduct vulnerability scans, analyze the results, and recommend remediation actions. This course covers key areas for a vulnerability analyst, such as understanding attack mechanisms, vulnerabilities, and countermeasures. The course’s modules on access control, telecommunications security, and cryptography will offer a strong foundation for vulnerability analysis work. It is advised that someone seeking this role consider taking this course specifically.
System Administrator
A system administrator is responsible for the day to day management of computer systems and servers. This includes installing, configuring, and maintaining systems, as well as ensuring their security. While the role is not purely about security, the topics in this course will help the system administrator maintain system security. The course introduces access control, scripting, and security architecture. System administrators need to understand security to effectively manage systems. While this course is not the only relevant course, it may help someone better perform their duties.
Security Auditor
A security auditor assesses an organization's security practices to ensure they are compliant with industry standards and regulations. They review security policies, procedures, and controls and identify areas for improvement. This course may be useful for a security auditor as it explores legal, regulatory, and compliance requirements, which are key aspects of a security audit. Additionally, understanding the technical aspects of security, as provided in the course, allows security auditors to assess the effectiveness of controls.
Compliance Officer
A compliance officer ensures that an organization adheres to laws, regulations, and internal policies. In the context of cybersecurity, this involves monitoring and enforcing security compliance. This course may be useful for a compliance officer, as it provides insights into the legal, regulatory, and compliance requirements for cybersecurity which are central to this role. The course's coverage of risk management and security policies will be relevant for someone in this position. This role typically requires a strong understanding of the law, regulations, and business. This course is a starting point.
Penetration Tester
A penetration tester simulates cyber attacks on computer systems to identify vulnerabilities. They then report these vulnerabilities to the organization and provide recommendations for remediation. While this course does not focus on penetration testing, it may be helpful for someone seeking a role as a penetration tester, as it introduces the attacker mindset and how to analyze vulnerabilities. The course’s coverage of attack mechanisms and countermeasures may be useful for understanding how to exploit vulnerabilities and defend against attacks. This course is a good place to start for a penetration tester.
IT Manager
An IT manager is responsible for the overall planning, direction, and coordination of IT activities within an organization. This role involves leadership and strategy, but also requires a foundational understanding of security principles. This course can be useful for an IT manager who needs to understand cybersecurity risks and controls. The course's coverage of secure architectures, risk management, and business continuity planning can help an IT manager make informed decisions about cybersecurity initiatives. This may broaden the scope of their expertise. This course is a starting point.
Data Security Specialist
A data security specialist is focused on protecting an organization's data from unauthorized access, misuse, and loss. This role is primarily concerned with data protection, but requires knowledge of security principles. The course’s introduction to concepts such as access controls, cryptography, and legal compliance may be useful, but a data security specialist's focus is narrower than the breadth of this course. The course will introduce a data security specialist to some relevant topics, which may be useful as a starting point.
Software Developer
A software developer designs, codes, and tests software applications. While this role does not directly involve security, understanding security principles can help a software developer create more secure software, particularly in web facing applications. This course introduces concepts like secure architecture, cryptography, and access control, which will help a software developer be mindful of security. However it is advised that those interested in this role look into courses that better match their chosen career field.
Project Manager
A project manager plans, executes, and closes projects including those related to information technology. While a project manager does not need to know all the technical details, understanding the basics of cybersecurity may help with project planning for security related projects. This course will introduce a project manager to topics such as risk management, compliance, and security planning, which may be relevant for security focused projects. However it is advised that those interested in this role look into courses that better match their chosen career field.

Reading list

We've selected two books that we think will supplement your learning. Use these to develop background knowledge, enrich your coursework, and gain a deeper understanding of the topics covered in Cyber Security Technologies.
Provides a comprehensive overview of security engineering principles and practices. It covers a wide range of topics, from cryptography to physical security, and offers practical advice on how to design and build secure systems. It is particularly useful for understanding the broader context of cybersecurity and the trade-offs involved in different security solutions. This book is commonly used as a textbook at academic institutions.
Provides a practical guide to cryptography, covering a wide range of topics from symmetric and asymmetric encryption to hash functions and digital signatures. It focuses on the practical aspects of implementing cryptographic solutions and offers guidance on how to avoid common pitfalls. This book is more valuable as additional reading than it is as a current reference. It adds more depth to the cryptography module.

Share

Help others find this course page by sharing it with your friends and followers:

Similar courses

Similar courses are unavailable at this time. Please try again later.
Our mission

OpenCourser helps millions of learners each year. People visit us to learn workspace skills, ace their exams, and nurture their curiosity.

Our extensive catalog contains over 50,000 courses and twice as many books. Browse by search, by topic, or even by career interests. We'll match you to the right resources quickly.

Find this site helpful? Tell a friend about us.

Affiliate disclosure

We're supported by our community of learners. When you purchase or subscribe to courses and programs or purchase books, we may earn a commission from our partners.

Your purchases help us maintain our catalog and keep our servers humming without ads.

Thank you for supporting OpenCourser.

© 2016 - 2025 OpenCourser