We may earn an affiliate commission when you visit our partners.
Course image
Greg Williams

I’ve heard this before – “I’m not sure my computer security practices are working”. I reply “Have you tested them?” This course is the fourth and final course in the Practical Computer Security specialization. In this course, you’ll learn how to proactively test what you have put in place to protect your data. In the first week you’ll be able to discuss the basics of deterrents and how to “trick” attackers into believing they’ve hit a goldmine of data away from your real systems. In week 2, you’ll be able to understand and discuss the steps of penetration testing methodology. In week 3, you will be able to understand and apply what you have learned on your own systems to test whether your systems are secure or not. In week 4, we’ll discuss planning for your own methodology that you can apply to your own systems. And finally in week 5, we’ll finish up with a project that will allow you to test your skills in a safe environment.

Enroll now

What's inside

Syllabus

Information Sharing and Threat Intelligence
This module covers information sharing. Information sharing is an important tool to help organizations gather information from others so they can protect themselves.
Read more
Penetration Testing - Methodology
This module will cover the pen testing methodology. Not following a pen testing methodology may lead to false positives or worse, false negatives in a testing scenario.
Common Pen Testing Tools
This module will cover some of the tools used in the penetration testing methodology. These are just common tools used to gain information, find exploits and compromise systems. There are many more tools out there, but these are the most commonly used.
Proactive computer security management
This module will cover some of the other issues and concerns for those interested in proactive security. Legal issues are important for any level of management and administration to be concerned with. Planning goes a long way toward effective proactive computer security.
Exploiting OWASP Top 20 Controls
This is the course project. The goal is for you to compromise or gain data from a test system.

Good to know

Know what's good
, what to watch for
, and possible dealbreakers
Explores information sharing, which is standard practice in proactive information security
Explores the methodology used to conduct penetration testing
Teaches learners to detect potential security weaknesses in their own systems
Requires students to have a strong understanding of computer security concepts
Provides a comprehensive overview of proactive computer security management
Includes a hands-on project that allows students to apply their learning

Save this course

Save Proactive Computer Security to your list so you can find it easily later:
Save

Reviews summary

Highly rated proactive security course

Learners say that Proactive Computer Security is an excellent course that is highly recommended. They find the material to be detailed, informative, and well structured. The lectures are engaging and the instructor is knowledgeable and motivating. Students appreciate the practical assignments and real-world examples that help them to apply their learning. Overall, learners say that this course is a valuable resource for anyone interested in computer security.
The course is well-organized and easy to follow.
"Detailed and informative, I found the course to be well structured."
Students appreciate the hands-on assignments and examples.
"Thank you! Beautiful knowledge has been learned!"
"Detailed and informative, I found the course to be well structured."
"A great learning experience for getting something about penetration testing"
"Well done, well structured, good the theoretical parts and the exercises. A platform available for you and your real tests"
"learnt a lot about pen Testing Tools and Methodologies ths course ws was very essential and power boosting for me ..i would like to thank my university and coursera for the help extended also the instructor of this course and the material provided"
Learners highly value the instructor's expertise and teaching style.
"It was really good & understandable course, Thank you very much"
"More helpful that courses ive done thorugh TAFE"
"Excellent course and good material to learn fast cybersecurity."
"One of the best course in the field of cyber security. One should must enroll for this if he/she interested in computer security."
"For anyone who is even the least bit concerned, aware or curious about computer security, for them , this course is a MUST. The way the instructor (Greg Williams) Teaches the concepts is really motivating. The way he presents his material is perfect."
"I have learned a lot about cybersecurity despite my limited knowledge on computer language. Going through the courses gave me ample understanding in protecting computer systems, determining how to mitigate and respond to attacks, and the importance of documentation. Thank you for the generosity in sharing your knowledge! More power to you. "
Students largely agree that this is a helpful course.
"tq"
"good"
"nice"
"good"
"Good Course"
"good course"
"It was good"
"That was exicting"
"Excellent course !"
"Very Impressive course"
"Excelente capacitación!!!"
"Good Course - Good teacher!!"
"Great knowledge gathered here."
"Good Course For New Pentesters"
"Good insight. Good information"
"Interesting course about proactive securuty"
"More helpful that courses ive done thorugh TAFE"
"Thank you! Beautiful knowledge has been learned!"
"Excellent course and good material to learn fast cybersecurity."
"the course is support to how to develop in your computer skills"
"It was really good & understandable course, Thank you very much"
"Very interesting content, and allows you to go down to the pipes"
"Excellent course. Would recommend it to those starting in security."
"Detailed and informative, I found the course to be well structured."
"A great learning experience for getting something about penetration testing"
"buen curso, me ayudo a expandir mis conocimientos en el arrea de ciber seguridad"
"Well done, well structured, good the theoretical parts and the exercises. A platform available for you and your real tests"
"One of the best course in the field of cyber security. One should must enroll for this if he/she interested in computer security."
"It's useful course for learning how to blend and develop learning and teaching experience to be more interactive with the help of multi-technology"
"Great Class. I learned a lot, especially at the end or the peer based grading final. It really made you put your thinking cap on and act like a red teamer."
"Very helpful in building knowledge towards more advance security related certifications. This, for me, was good in terms of understanding the surface of Ethical Hacking."
"Excellent course! Of the entire specialization, this is the course I've liked the most. I like that it includes both theory and practical cases, not only for the last assigment."
"learnt a lot about pen Testing Tools and Methodologies ths course ws was very essential and power boosting for me ..i would like to thank my university and coursera for the help extended also the instructor of this course and the material provided"
"For anyone who is even the least bit concerned, aware or curious about computer security, for them , this course is a MUST. The way the instructor (Greg Williams) Teaches the concepts is really motivating. The way he presents his material is perfect."
"I have learned a lot about cybersecurity despite my limited knowledge on computer language. Going through the courses gave me ample understanding in protecting computer systems, determining how to mitigate and respond to attacks, and the importance of documentation. Thank you for the generosity in sharing your knowledge! More power to you. "
A few learners experienced difficulties with the final task.
"the final task is very confusing, it's not very clear how to do it"
"No hands-on work. No challenges. This was a complete waste of my time! I expected better from Stanford! Will not continue!"
"Pretty good course overall. The only thing I'd be upset with is the final practical implementation of OWASP, the instructor did not properly explain the instructions, and a few topics in between were haphazard."

Activities

Be better prepared before your course. Deepen your understanding during and after it. Supplement your coursework and achieve mastery of the topics covered in Proactive Computer Security with these activities:
Review networking concepts
Reinforce your understanding of networking fundamentals, ensuring you have a strong foundation for comprehending advanced pen testing techniques that involve network analysis and exploitation.
Browse courses on Networking
Show steps
  • Review basic networking concepts such as IP addressing, subnetting, and routing
  • Practice network troubleshooting and configuration
  • Use online resources and tutorials to refresh your knowledge
  • Complete practice exercises or quizzes
  • Discuss networking concepts with peers or mentors
Form a study group with fellow students
Collaborate with peers to reinforce concepts, discuss case studies, and share insights, fostering a supportive learning environment that enhances your understanding of penetration testing.
Show steps
  • Reach out to classmates or join online forums
  • Establish regular meeting times and schedules
  • Create a shared document or workspace for notes and resources
  • Take turns presenting on different topics
  • Provide constructive feedback and support to each other
Compile a resource list for penetration testers
Build a valuable repository of tools, techniques, and resources specifically tailored to penetration testing, providing you with quick access to the information you need when conducting assessments.
Show steps
  • Research and identify reputable sources of information
  • Categorize and organize resources based on topic or tool type
  • Include a variety of resources such as articles, tutorials, videos, and tools
  • Document the resources and share them with others
  • Regularly update the compilation with new and relevant resources
Five other activities
Expand to see all activities and additional details
Show all eight activities
Follow along with a penetration testing tutorial
Gain hands-on experience by following step-by-step instructions from industry experts, reinforcing your knowledge of the pen testing process.
Show steps
  • Find a reputable tutorial that aligns with your skill level
  • Set up the necessary tools and environment
  • Follow the tutorial steps carefully and take notes
  • Experiment with different techniques and scenarios
  • Share your learnings and ask questions in online forums
Test your skills with OWASP Top 20
Practice identifying and exploiting common web application vulnerabilities to solidify your understanding of penetration testing methodology.
Show steps
  • Familiarize yourself with the OWASP Top 20
  • Set up a test environment
  • Test for vulnerabilities using common tools and techniques
  • Analyze results and identify potential risks
  • Develop mitigation strategies
Design and implement a security assessment plan
Apply your knowledge of penetration testing methodologies to develop a comprehensive security assessment plan, enhancing your ability to identify and mitigate vulnerabilities in real-world scenarios.
Show steps
  • Define the scope and objectives of the assessment
  • Gather information about the target systems and network
  • Select and prioritize appropriate pen testing techniques
  • Execute the assessment and document the findings
  • Analyze the results and provide recommendations for remediation
Build your own penetration testing toolkit
Enhance your practical skills by creating a customized toolkit tailored to your specific needs, ensuring you have the right tools for the job when conducting pen tests.
Show steps
  • Research and identify essential tools for each stage of the pen testing process
  • Download, install, and configure the selected tools
  • Create custom scripts or plugins to automate tasks
  • Organize and document your toolkit for easy reference
  • Test and evaluate the effectiveness of your toolkit
Contribute to an open-source pen testing project
Gain real-world experience by contributing to the development and maintenance of open-source pen testing tools, enhancing your technical skills and understanding of the community.
Show steps
  • Identify an open-source pen testing project that aligns with your interests
  • Review the project documentation and codebase
  • Identify areas where you can contribute
  • Submit bug reports, feature requests, or code patches
  • Engage with the project community and seek mentorship

Career center

Learners who complete Proactive Computer Security will develop knowledge and skills that may be useful to these careers:
Security Manager
Security Managers oversee the security of an organization's computer networks and systems. This course can help you build a foundation for success by teaching you about proactive and deterrent strategies, penetration testing methodologies, and security management. A background in proactive computer security is essential to be successful in this role.
Information Security Analyst
Information Security Analysts plan and carry out security measures to protect an organization's computer networks and systems. This course can help you build a foundation for success by teaching you about proactive and deterrent strategies, penetration testing methodologies, and security management. A background in proactive computer security is essential to be successful in this role.
Network Security Engineer
Network Security Engineers design, implement, and maintain security measures for computer networks. This course can help you build a foundation for success by teaching you about proactive and deterrent strategies, penetration testing methodologies, and security management. A background in proactive computer security is essential to be successful in this role.
Cybersecurity Engineer
Cybersecurity Engineers design, implement, and maintain security measures for computer networks and systems. This course can help you build a foundation for success by teaching you about proactive and deterrent strategies, penetration testing methodologies, and security management. A background in proactive computer security is essential to be successful in this role.
Penetration Tester
Penetration Testers identify security vulnerabilities in computer networks and systems. This course can help you build a foundation for success by teaching you about penetration testing methodologies and tools. A background in proactive computer security is essential to be successful in this role.
Security Architect
Security Architects design and implement security measures to protect an organization's computer networks and systems from unauthorized access, use, disclosure, disruption, modification, or destruction. This course can help you build a foundation for success by teaching you about proactive and deterrent strategies, penetration testing methodologies, and security management. A background in proactive computer security is essential to be successful in this role.
Ethical Hacker
Ethical Hackers use their skills to identify and mitigate security vulnerabilities in computer networks and systems. This course can help you build a foundation for success by teaching you about penetration testing methodologies and proactive security management. A background in proactive computer security is essential to be successful in this role.
Security Researcher
Security Researchers discover and analyze security vulnerabilities in computer networks and systems. This course can help you build a foundation for success by teaching you about penetration testing methodologies and proactive security management. A background in proactive computer security is essential to be successful in this role.
Cybersecurity Analyst
Cybersecurity Analysts protect computer networks and systems from cyberattacks. This course can help you build a foundation for success by teaching you about proactive and deterrent strategies, penetration testing methodologies, and security management. A background in proactive computer security is essential to be successful in this role.
Data Protection Officer
Data Protection Officers ensure that an organization's data is protected from unauthorized access, use, disclosure, disruption, modification, or destruction. This course may be useful for building a foundation for this role by teaching you about proactive and deterrent strategies, penetration testing methodologies, and security management. A background in proactive computer security may also be helpful when protecting data.
Privacy Engineer
Privacy Engineers design and implement measures to protect an organization's privacy. This course may be useful for building a foundation for this role by teaching you about proactive and deterrent strategies, penetration testing methodologies, and security management. A background in proactive computer security may also be helpful when protecting privacy.
Computer Forensics Analyst
Computer Forensics Analysts investigate and analyze computer systems to uncover evidence of criminal activity. This course may be useful for building a foundation for this role by teaching you about penetration testing methodologies and proactive security management. A background in proactive computer security may also be helpful when investigating computer forensics.
Security Consultant
Security Consultants help organizations to identify and mitigate security risks. This course may be useful for building a foundation for this role by teaching you about penetration testing methodologies and proactive security management. Experience with proactive computer security may also be helpful when consulting with clients.
Incident Responder
Incident Responders investigate and respond to security incidents. This course may be useful for building a foundation for this role by teaching you about proactive and deterrent strategies, penetration testing methodologies, and security management. A background in proactive computer security may also be helpful when responding to incidente.
IT Auditor
IT Auditors evaluate the security of computer networks and systems. This course may be useful for building a foundation for this role by teaching you about penetration testing methodologies and proactive security management. A background in proactive computer security may also be helpful when auditing IT systems.

Reading list

We've selected seven books that we think will supplement your learning. Use these to develop background knowledge, enrich your coursework, and gain a deeper understanding of the topics covered in Proactive Computer Security.
Has been used as a textbook in computer science and information technology programs at Purdue University, Villanova University, and other institutions.
This second edition of The Hacker Playbook expands on the highly successful previous version by providing hands-on penetration testing walkthroughs.
Is written by Kevin Mitnick, a well-known security consultant and former hacker, and William L. Simon, a journalist and author specializing in computer security.
This book practical guide to network security assessment.
Although it's a more general resource, this book provides a good overview of penetration testing.

Share

Help others find this course page by sharing it with your friends and followers:

Similar courses

Here are nine courses similar to Proactive Computer Security.
Imagery, Automation, and Applications
Web App Pen Testing: Reconnaissance
Project Delivery in Business Analysis and Capstone Project
Enterprise System Management and Security
Giving Sense to Your Leadership Experience
UX Research at Scale: Surveys, Analytics, Online Testing
Analysing Complexity
Internet of Things Capstone: Build a Mobile Surveillance...
Internet of Things Capstone V2: Build a Mobile...
Our mission

OpenCourser helps millions of learners each year. People visit us to learn workspace skills, ace their exams, and nurture their curiosity.

Our extensive catalog contains over 50,000 courses and twice as many books. Browse by search, by topic, or even by career interests. We'll match you to the right resources quickly.

Find this site helpful? Tell a friend about us.

Affiliate disclosure

We're supported by our community of learners. When you purchase or subscribe to courses and programs or purchase books, we may earn a commission from our partners.

Your purchases help us maintain our catalog and keep our servers humming without ads.

Thank you for supporting OpenCourser.

© 2016 - 2024 OpenCourser