We may earn an affiliate commission when you visit our partners.
Course image
Dr. Edward G. Amoroso

This course introduces a series of advanced and current topics in cyber security, many of which are especially relevant in modern enterprise and infrastructure settings. The basics of enterprise compliance frameworks are provided with introduction to NIST and PCI. Hybrid cloud architectures are shown to provide an opportunity to fix many of the security weaknesses in modern perimeter local area networks.

 

Read more

This course introduces a series of advanced and current topics in cyber security, many of which are especially relevant in modern enterprise and infrastructure settings. The basics of enterprise compliance frameworks are provided with introduction to NIST and PCI. Hybrid cloud architectures are shown to provide an opportunity to fix many of the security weaknesses in modern perimeter local area networks.

 

Emerging security issues in blockchain, blinding algorithms, Internet of Things (IoT), and critical infrastructure protection are also described for learners in the context of cyber risk. Mobile security and cloud security hyper-resilience approaches are also introduced. The course completes with some practical advice for learners on how to plan careers in cyber security.

Enroll now

What's inside

Syllabus

Security Awareness, Compliance, Assessments, and Risk
This module includes an introduction to many practical aspects of modern enterprise security including awareness, compliance, assessments, and risk management.
Read more
Hybrid Cloud Security
This module provides students with an introduction to the cyber security implications of the enterprise shifting to a hybrid cloud computing model.
Blockchain, Anonymity, and Critical Infrastructure Protection
This module introduces several advanced topics in cyber security ranging from blockchain usage, user anonymity, and critical infrastructure protection.
Mobility Security and Deception
This module introduces several advanced topics in cyber security including mobility security and deception – and includes suggestions on career planning for future cyber professionals.

Good to know

Know what's good
, what to watch for
, and possible dealbreakers
Develops practical aspects of modern enterprise security, including awareness, compliance, assessments, and risk management
Focuses on cyber security in modern enterprise and infrastructure settings
Provides learners with an introduction to hybrid cloud computing and its cyber security implications
Introduces advanced topics in cyber security, including blockchain usage, user anonymity, and critical infrastructure protection
Introduces topics in mobility security and deception
Helps learners plan careers in cyber security

Save this course

Save Enterprise and Infrastructure Security to your list so you can find it easily later:
Save

Reviews summary

Highly rated enterprise and infrastructure security course

Learners say this largely positive course is engaging and informative. Dr. Amoroso is very well received by students and learners, with many saying he is knowledgeable and passionate. The course is described as great and amazing by many. It is said to be very thorough and easy to understand. The course is full of relevant examples that will prepare learners well for a career in cyber security. Overall, learners say Dr. Amoroso's teaching method is very helpful and makes the material easy to remember.
Course is very informative
"Very useful and interesting course."
"The course was awesome and interesting"
"This course is nicely structured, and very resourceful"
Course prepares learners for a career in cyber security
"Very good coverage of the basic concepts and important controls in the infrastructure security."
"This course is very informative and effective for the ones whishing to pursue their careers in Cybersecurity."
"I am confident that this course prepares me for a career in cyber security as the fundamental concepts taught are done so with directly relevant examples that I expect to have to work with in industry."
Dr. Amoroso is fantastic
"Excellent!!"
"Excellent and inspirational!"
"Very good for improvement my skill."
"Thoroughly inspiring and enjoyable!"
"Very informative and interesting course."
"The course was awesome and interesting.The teacher taught us very well and the content was informative and accurate."
Some issues with the quizzes and exams
"Good apart from the errors in the quizzes! "
"Some of the reading material is unavailable. Otherwise, the course is great."
"This is a good course but a few links do not work and it is therefore not as comprehensive as i would like. Otherwise very decent content and good pace."

Activities

Be better prepared before your course. Deepen your understanding during and after it. Supplement your coursework and achieve mastery of the topics covered in Enterprise and Infrastructure Security with these activities:
Review Course Materials Regularly
Enhance your understanding and retention of course content by regularly reviewing materials.
Show steps
  • Set aside time each week to review notes, slides, and other course materials.
  • Attempt practice problems and quizzes to test your understanding.
Participate in Cybersecurity Discussion Groups
Expand your knowledge and connect with peers by actively engaging in cybersecurity discussion groups.
Browse courses on Cybersecurity Community
Show steps
  • Join online forums and social media groups dedicated to cybersecurity.
  • Ask questions, share insights, and engage in discussions.
  • Collaborate with others on projects and learning initiatives.
Join a Cybersecurity Study Group
Enhance your learning experience by joining a Cybersecurity Study Group, where you can collaborate with peers, discuss course materials, and work on projects together.
Show steps
  • Find or create a study group with other students taking the course
  • Establish regular meeting times and a communication channel
  • Review course materials together, discuss concepts, and work on assignments collaboratively
Nine other activities
Expand to see all activities and additional details
Show all 12 activities
Complete the SANS Institute's 'Security Awareness Training Tutorial'
Enhance your understanding of cybersecurity fundamentals by completing the SANS Institute's Security Awareness Training Tutorial, which covers topics such as phishing, malware, and social engineering.
Browse courses on Security Awareness
Show steps
  • Go through the tutorial modules
  • Complete the interactive exercises and quizzes
  • Apply the learned concepts to your own cybersecurity practices
Review 'NIST Cybersecurity Framework for Improving Critical Infrastructure Cybersecurity'
Build a strong foundation in cybersecurity frameworks by reviewing the NIST Cybersecurity Framework, which provides guidance on protecting critical infrastructure from cyberattacks.
Show steps
  • Read through the framework and its components
  • Identify the key principles and practices outlined in the framework
  • Consider how these principles can be applied to your own organization's cybersecurity posture
Practice Penetration Testing Techniques
Reinforce your understanding of penetration testing techniques by practicing them in a controlled environment.
Browse courses on Penetration Testing
Show steps
  • Set up a lab environment for practice.
  • Use tools like Burp Suite and Kali Linux to simulate real-world scenarios.
  • Practice identifying and exploiting vulnerabilities in sample applications.
Attend a Blockchain Security Workshop
Deepen your understanding of blockchain technology and its security implications by attending a Blockchain Security Workshop, which will cover topics such as smart contract security, consensus mechanisms, and cryptoeconomics.
Browse courses on Blockchain Security
Show steps
  • Research different blockchain security workshops
  • Choose a workshop that aligns with your interests and learning objectives
  • Attend the workshop and actively participate in discussions and exercises
Build a Simple Cybersecurity Dashboard
Gain practical experience in monitoring cybersecurity events by building a Simple Cybersecurity Dashboard, which will provide real-time visibility into your network's security posture.
Browse courses on Security Monitoring
Show steps
  • Choose a platform or tool for building the dashboard
  • Identify the key metrics and data sources you want to include in the dashboard
  • Design and implement the dashboard using the chosen platform or tool
  • Configure the dashboard to send alerts or notifications when security events occur
Create a Cybersecurity Incident Response Plan
Develop a comprehensive understanding of cybersecurity incident response by creating a Cybersecurity Incident Response Plan, which outlines the steps and procedures to follow in the event of a cyberattack.
Show steps
  • Research best practices and industry standards for incident response
  • Identify potential threats and vulnerabilities that your organization faces
  • Develop a step-by-step plan for responding to different types of cybersecurity incidents
  • Test and validate your plan through simulations or exercises
Design a Threat Modeling Framework for a Specific Industry
Deepen your understanding of threat modeling by creating a framework tailored to a specific industry's unique needs.
Browse courses on Threat Modeling
Show steps
  • Research industry-specific threats and regulations.
  • Identify and analyze potential attack vectors.
  • Develop mitigation strategies and controls.
  • Document your framework and present it to stakeholders.
Conduct a Vulnerability Assessment and Penetration Testing (VAPT)
Gain hands-on experience in identifying and mitigating cybersecurity vulnerabilities by conducting a Vulnerability Assessment and Penetration Testing (VAPT), which involves scanning your systems for weaknesses and attempting to exploit them.
Browse courses on Vulnerability Assessment
Show steps
  • Learn about different types of vulnerability assessment tools and techniques
  • Select and use appropriate tools to scan your systems for vulnerabilities
  • Analyze the results of the scan and prioritize the vulnerabilities based on their severity
  • Develop and implement a plan to mitigate the identified vulnerabilities
Participate in a Capture the Flag (CTF) Competition
Test your cybersecurity skills and knowledge by participating in a Capture the Flag (CTF) Competition, which involves solving a series of cybersecurity challenges within a time limit.
Show steps
  • Find a CTF competition that matches your skill level and interests
  • Familiarize yourself with the rules and format of the competition
  • Team up with other participants or compete individually
  • Solve the challenges and capture as many flags as possible

Career center

Learners who complete Enterprise and Infrastructure Security will develop knowledge and skills that may be useful to these careers:
Information Security Risk Analyst
Information security risk analysts assess an organization's security risks and develop strategies to mitigate those risks. They also work to ensure that the organization's security measures are effective and aligned with the organization's business goals. This course can help build a foundation for a career as an information security risk analyst by providing an understanding of the latest security threats and how to mitigate them. Additionally, the course covers compliance frameworks and other important aspects of enterprise security.
Cybersecurity Engineer
Cybersecurity engineers design and implement security systems to protect an organization's networks, systems, and data. They also work to identify and respond to security threats. This course can help build a foundation for a career as a cybersecurity engineer by providing an understanding of the latest security threats and how to mitigate them. Additionally, the course covers hybrid cloud security, blockchain security, and other important aspects of modern enterprise cybersecurity.
Security Architect
Security architects design and implement security measures to protect an organization's networks, systems, and data. They also work to ensure that security measures are aligned with the organization's business goals. This course can help build a foundation for a career as a security architect by providing an understanding of the latest security threats and how to mitigate them. Additionally, the course covers compliance frameworks and other important aspects of enterprise security.
Blockchain Developer
Blockchain developers design and develop blockchain-based applications. They also work to ensure that blockchain-based applications are secure and scalable. This course can help build a foundation for a career as a blockchain developer by providing an understanding of the latest security threats and how to mitigate them. Additionally, the course covers blockchain security and other important aspects of modern enterprise cybersecurity.
Cloud Security Architect
Cloud security architects design and implement security measures to protect cloud-based systems and data. They also work to ensure that cloud-based systems are compliant with all relevant regulations. This course can help build a foundation for a career as a cloud security architect by providing an understanding of the latest security threats and how to mitigate them. Additionally, the course covers hybrid cloud security and other important aspects of modern enterprise cybersecurity.
Software Security Engineer
Software security engineers design, implement, and maintain security measures in software applications. They also work to ensure that software applications are secure and compliant with all relevant regulations. This course can help build a foundation for a career as a software security engineer by providing an understanding of the latest security threats and how to mitigate them. Additionally, the course covers compliance frameworks and other important aspects of enterprise security.
Mobile Security Analyst
Mobile security analysts assess the security of mobile devices and applications. They also develop and implement security measures to protect mobile devices and applications from threats. This course can help build a foundation for a career as a mobile security analyst by providing an understanding of the latest security threats and how to mitigate them. Additionally, the course covers mobile security and other important aspects of modern enterprise cybersecurity.
Security Engineer
Security engineers design, implement, and maintain security systems to protect an organization's networks, systems, and data. They also work to ensure that security systems are aligned with the organization's business goals. This course can help build a foundation for a career as a security engineer by providing an understanding of the latest security threats and how to mitigate them. Additionally, the course covers compliance frameworks and other important aspects of enterprise security.
Security Analyst
Security analysts assess an organization's security status and develop security measures to protect its systems and data. They may also conduct security audits to identify vulnerabilities and recommend corrective actions. This course can help build a foundation for a career as a security analyst by providing an understanding of the latest security threats and how to mitigate them. Additionally, the course covers compliance frameworks and other important aspects of enterprise security.
Security Consultant
Security consultants provide advice to organizations on how to improve their security posture. They may also conduct security assessments and recommend corrective actions. This course can help build a foundation for a career as a security consultant by providing an understanding of the latest security threats and how to mitigate them. Additionally, the course covers compliance frameworks and other important aspects of enterprise security.
Information Security Manager
Information security managers develop and implement security policies and procedures to protect an organization's data and systems. They also oversee the implementation of security technologies and work to ensure that the organization is compliant with all relevant regulations. This course may be useful for those who wish to become information security managers by providing an understanding of the latest security threats and how to mitigate them. Additionally, the course covers compliance frameworks and other important aspects of enterprise security.
Security Operations Manager
Security operations managers oversee the day-to-day operations of an organization's security program. They also work to identify and respond to security threats. This course may be useful for those who wish to become security operations managers by providing an understanding of the latest security threats and how to mitigate them. Additionally, the course covers compliance frameworks and other important aspects of enterprise security.
Security Program Manager
Security program managers plan and implement an organization's security program. They also work to ensure that the security program is effective and aligned with the organization's business goals. This course may be useful for those who wish to become security program managers by providing an understanding of the latest security threats and how to mitigate them. Additionally, the course covers compliance frameworks and other important aspects of enterprise security.
Privacy Officer
Privacy officers are responsible for protecting an organization's privacy interests. They may also work to develop and implement privacy policies and procedures. This course may be useful for those who wish to become privacy officers by providing an understanding of the latest security threats and how to mitigate them. Additionally, the course covers compliance frameworks and other important aspects of enterprise security.
Data Protection Officer
Data protection officers are responsible for ensuring that an organization complies with all relevant data protection regulations. They may also work to develop and implement data protection policies and procedures. This course may be useful for those who wish to become data protection officers by providing an understanding of the latest security threats and how to mitigate them. Additionally, the course covers compliance frameworks and other important aspects of enterprise security.

Reading list

We've selected seven books that we think will supplement your learning. Use these to develop background knowledge, enrich your coursework, and gain a deeper understanding of the topics covered in Enterprise and Infrastructure Security.
Provides a comprehensive guide to cloud security concepts and practices. It aligns with the course's coverage of cloud security and can serve as a valuable reference for implementing secure cloud solutions.
Offers practical advice and guidance on planning for a career in cybersecurity. It aligns with the course's concluding module on career planning and can serve as a valuable resource for students seeking career advice and insights.
Provides a fascinating look at the human element of security. It valuable resource for anyone who wants to learn more about how to protect themselves from social engineering attacks.
Provides a comprehensive overview of security awareness for employees. It valuable resource for organizations that want to improve their security posture by educating their employees about security risks.
Provides a comprehensive overview of computer security. It valuable resource for anyone who wants to learn more about the foundations of computer security.
Provides a comprehensive overview of cryptography and network security. It valuable resource for anyone who wants to learn more about the foundations of cryptography and network security.

Share

Help others find this course page by sharing it with your friends and followers:

Similar courses

Here are nine courses similar to Enterprise and Infrastructure Security.
Real-Time Cyber Threat Detection and Mitigation
Most relevant
Palo Alto Networks Cybersecurity Foundation
Most relevant
Check Point Jump Start: Cloud Security
Cloud Infrastructure Analysis with Prowler
Implement Infrastructure Security for Cloud
Enabling Security Governance and Compliance in DevSecOps
Software Defined Networking (SDN) Access Security
AWS Operating Optimal Hybrid Environments
Cloud Computing Applications, Part 1: Cloud Systems and...
Our mission

OpenCourser helps millions of learners each year. People visit us to learn workspace skills, ace their exams, and nurture their curiosity.

Our extensive catalog contains over 50,000 courses and twice as many books. Browse by search, by topic, or even by career interests. We'll match you to the right resources quickly.

Find this site helpful? Tell a friend about us.

Affiliate disclosure

We're supported by our community of learners. When you purchase or subscribe to courses and programs or purchase books, we may earn a commission from our partners.

Your purchases help us maintain our catalog and keep our servers humming without ads.

Thank you for supporting OpenCourser.

© 2016 - 2024 OpenCourser