Save for later

Detecting and Mitigating Cyber Threats and Attacks

This course is a part of Cybersecurity for Business, a 4-course Specialization series from Coursera.

Computer attacks and data breaches are inevitable. It seems like every day a data breach occurs and the victims of the data breach suffer. Their information is stolen or posted online. The company’s or businesses who had the breach go on, learn a little from the attack, and just give credit monitoring out as if nothing happened. What if you could help prevent a data breach in your organization? This is the third course in the Practical Computer Security specialization. This course looks at detection and mitigation of threats and attack vectors and discusses how to use tools and principles to protect information. By the end of the course you should be able to make suggestions on what type of detection and mitigation strategy is right for your systems or business given the known threats and attack vectors. You should be able to discuss what features you want in a firewall, or how cash registers or sensitive data systems should be secured. The project at the end of the course will allow you to apply what you have learned to argue what type of detection and mitigation strategies should have been employed by companies and businesses that have suffered a data breach.

Get Details and Enroll Now

OpenCourser is an affiliate partner of Coursera.

Set Reminder Save for later

Get a Reminder

Not ready to enroll yet? We'll send you an email reminder for this course

Send to:

Coursera

&

University of Colorado System

Rating 4.6 based on 8 ratings
Length 6 weeks
Starts Jun 17 (yesterday)
Cost $79
From University of Colorado System via Coursera
Instructor Greg Williams
Download Videos On all desktop and mobile devices
Language English
Subjects Programming Business IT & Networking
Tags Computer Science Business Business Strategy Computer Security And Networks Security Information Technology

Get a Reminder

Get an email reminder about this course

Send to:

What people are saying

According to other learners, here's what you need to know

it could move in one review

It could move a little faster for my tastes as there seems to be some drawing out of information a bit to ensure you maintain your subscription longer but the content is good and the instruction clear.

collage or university in one review

Relevant skills for todays cyber landscape i learn alot onloine without going to collage or university Like the others in this series, I feel like ovrerall they are good.

ensure you maintain in one review

feel like ovrerall in one review

maintain your subscription in one review

onloine without going in one review

Careers

An overview of related careers and their average salaries in the US. Bars indicate income percentile.

Event Specialist and Data Collection Specialist $40k

Data Steward/Analyst $52k

Sn Data Analyst $75k

LAN/WAN Data Analyst $84k

Mobile Data Analyst $92k

Analyst, Fixed Income Data Management Consultant $101k

Assistant Research and Data Analyst Consultant $104k

Vice Assistant President Data Scientist Development Program $106k

Deputy Data Management Specialist $127k

Big Data Analytics Platform Architect and Business Intelligence Leader $143k

Data warehouse & BI professional $175k

Data Warehouse Solutions Architect $192k

Write a review

Your opinion matters. Tell us what you think.

Coursera

&

University of Colorado System

Rating 4.6 based on 8 ratings
Length 6 weeks
Starts Jun 17 (yesterday)
Cost $79
From University of Colorado System via Coursera
Instructor Greg Williams
Download Videos On all desktop and mobile devices
Language English
Subjects Programming Business IT & Networking
Tags Computer Science Business Business Strategy Computer Security And Networks Security Information Technology

Similar Courses

Sorted by relevance

Like this course?

Here's what to do next:

  • Save this course for later
  • Get more details from the course provider
  • Enroll in this course
Enroll Now