We may earn an affiliate commission when you visit our partners.
Course image
Dr. Edward G. Amoroso

This course introduces a series of advanced and current topics in cyber security, many of which are especially relevant in modern enterprise and infrastructure settings. The basics of enterprise compliance frameworks are provided with introduction to NIST and PCI. Hybrid cloud architectures are shown to provide an opportunity to fix many of the security weaknesses in modern perimeter local area networks.

Read more

This course introduces a series of advanced and current topics in cyber security, many of which are especially relevant in modern enterprise and infrastructure settings. The basics of enterprise compliance frameworks are provided with introduction to NIST and PCI. Hybrid cloud architectures are shown to provide an opportunity to fix many of the security weaknesses in modern perimeter local area networks.

Emerging security issues in blockchain, blinding algorithms, Internet of Things (IoT), and critical infrastructure protection are also described for learners in the context of cyber risk. Mobile security and cloud security hyper-resilience approaches are also introduced. The course completes with some practical advice for learners on how to plan careers in cyber security.

Enroll now

What's inside

Syllabus

Security Awareness, Compliance, Assessments, and Risk
This module includes an introduction to many practical aspects of modern enterprise security including awareness, compliance, assessments, and risk management.
Read more

Traffic lights

Read about what's good
what should give you pause
and possible dealbreakers
Develops practical aspects of modern enterprise security, including awareness, compliance, assessments, and risk management
Focuses on cyber security in modern enterprise and infrastructure settings
Provides learners with an introduction to hybrid cloud computing and its cyber security implications
Introduces advanced topics in cyber security, including blockchain usage, user anonymity, and critical infrastructure protection
Introduces topics in mobility security and deception
Helps learners plan careers in cyber security

Save this course

Create your own learning path. Save this course to your list so you can find it easily later.
Save

Reviews summary

Relevant enterprise security fundamentals overview

According to learners, this course provides a solid introduction (positive) to various current enterprise and infrastructure security topics (positive). Students particularly appreciate the coverage of areas like hybrid cloud security and critical infrastructure protection (positive), finding the material relevant to modern challenges (positive). While offering broad coverage across multiple domains (neutral), some students noted that the course touches briefly on complex subjects (warning), suggesting that deeper dives may require additional study (warning). The module on career planning (neutral) is highlighted as a useful addition (positive). Overall, it is seen as a valuable course for building a foundation in advanced enterprise security, though prior basic security knowledge is beneficial (warning).
Offers advice on careers in cyber security.
"The module on career planning was a surprisingly useful addition."
"I got some good ideas for navigating a career path in cybersecurity from this course."
"It was helpful to see career perspectives alongside the technical topics."
Lectures and materials are generally clear.
"The lectures were clear and the concepts were explained well."
"I found the course materials easy to understand and follow."
"Good explanation of potentially complex topics, making them accessible."
Focuses on current enterprise security challenges.
"The content felt very relevant to my job in enterprise IT."
"I appreciated the focus on current issues like hybrid cloud and IoT security."
"This course provided practical knowledge applicable to real-world security scenarios."
Assumes some prior knowledge in security.
"This course isn't for absolute beginners; having some prior security basics helps a lot."
"I found it challenging without having a foundation in core security concepts."
"Be prepared with some fundamental cybersecurity knowledge before starting this course."
Covers many areas, sometimes lacks depth.
"It gives a good overview of many security concepts relevant today."
"While comprehensive in scope, some modules felt too brief and could use more detail."
"I liked that it covered many topics, but for a deep understanding, I needed to look elsewhere."

Activities

Be better prepared before your course. Deepen your understanding during and after it. Supplement your coursework and achieve mastery of the topics covered in Enterprise and Infrastructure Security with these activities:
Review Course Materials Regularly
Enhance your understanding and retention of course content by regularly reviewing materials.
Show steps
  • Set aside time each week to review notes, slides, and other course materials.
  • Attempt practice problems and quizzes to test your understanding.
Participate in Cybersecurity Discussion Groups
Expand your knowledge and connect with peers by actively engaging in cybersecurity discussion groups.
Browse courses on Cybersecurity Community
Show steps
  • Join online forums and social media groups dedicated to cybersecurity.
  • Ask questions, share insights, and engage in discussions.
  • Collaborate with others on projects and learning initiatives.
Join a Cybersecurity Study Group
Enhance your learning experience by joining a Cybersecurity Study Group, where you can collaborate with peers, discuss course materials, and work on projects together.
Show steps
  • Find or create a study group with other students taking the course
  • Establish regular meeting times and a communication channel
  • Review course materials together, discuss concepts, and work on assignments collaboratively
Nine other activities
Expand to see all activities and additional details
Show all 12 activities
Complete the SANS Institute's 'Security Awareness Training Tutorial'
Enhance your understanding of cybersecurity fundamentals by completing the SANS Institute's Security Awareness Training Tutorial, which covers topics such as phishing, malware, and social engineering.
Browse courses on Security Awareness
Show steps
  • Go through the tutorial modules
  • Complete the interactive exercises and quizzes
  • Apply the learned concepts to your own cybersecurity practices
Review 'NIST Cybersecurity Framework for Improving Critical Infrastructure Cybersecurity'
Build a strong foundation in cybersecurity frameworks by reviewing the NIST Cybersecurity Framework, which provides guidance on protecting critical infrastructure from cyberattacks.
Show steps
  • Read through the framework and its components
  • Identify the key principles and practices outlined in the framework
  • Consider how these principles can be applied to your own organization's cybersecurity posture
Practice Penetration Testing Techniques
Reinforce your understanding of penetration testing techniques by practicing them in a controlled environment.
Browse courses on Penetration Testing
Show steps
  • Set up a lab environment for practice.
  • Use tools like Burp Suite and Kali Linux to simulate real-world scenarios.
  • Practice identifying and exploiting vulnerabilities in sample applications.
Attend a Blockchain Security Workshop
Deepen your understanding of blockchain technology and its security implications by attending a Blockchain Security Workshop, which will cover topics such as smart contract security, consensus mechanisms, and cryptoeconomics.
Browse courses on Blockchain Security
Show steps
  • Research different blockchain security workshops
  • Choose a workshop that aligns with your interests and learning objectives
  • Attend the workshop and actively participate in discussions and exercises
Build a Simple Cybersecurity Dashboard
Gain practical experience in monitoring cybersecurity events by building a Simple Cybersecurity Dashboard, which will provide real-time visibility into your network's security posture.
Browse courses on Security Monitoring
Show steps
  • Choose a platform or tool for building the dashboard
  • Identify the key metrics and data sources you want to include in the dashboard
  • Design and implement the dashboard using the chosen platform or tool
  • Configure the dashboard to send alerts or notifications when security events occur
Create a Cybersecurity Incident Response Plan
Develop a comprehensive understanding of cybersecurity incident response by creating a Cybersecurity Incident Response Plan, which outlines the steps and procedures to follow in the event of a cyberattack.
Show steps
  • Research best practices and industry standards for incident response
  • Identify potential threats and vulnerabilities that your organization faces
  • Develop a step-by-step plan for responding to different types of cybersecurity incidents
  • Test and validate your plan through simulations or exercises
Design a Threat Modeling Framework for a Specific Industry
Deepen your understanding of threat modeling by creating a framework tailored to a specific industry's unique needs.
Browse courses on Threat Modeling
Show steps
  • Research industry-specific threats and regulations.
  • Identify and analyze potential attack vectors.
  • Develop mitigation strategies and controls.
  • Document your framework and present it to stakeholders.
Conduct a Vulnerability Assessment and Penetration Testing (VAPT)
Gain hands-on experience in identifying and mitigating cybersecurity vulnerabilities by conducting a Vulnerability Assessment and Penetration Testing (VAPT), which involves scanning your systems for weaknesses and attempting to exploit them.
Browse courses on Vulnerability Assessment
Show steps
  • Learn about different types of vulnerability assessment tools and techniques
  • Select and use appropriate tools to scan your systems for vulnerabilities
  • Analyze the results of the scan and prioritize the vulnerabilities based on their severity
  • Develop and implement a plan to mitigate the identified vulnerabilities
Participate in a Capture the Flag (CTF) Competition
Test your cybersecurity skills and knowledge by participating in a Capture the Flag (CTF) Competition, which involves solving a series of cybersecurity challenges within a time limit.
Show steps
  • Find a CTF competition that matches your skill level and interests
  • Familiarize yourself with the rules and format of the competition
  • Team up with other participants or compete individually
  • Solve the challenges and capture as many flags as possible

Career center

Learners who complete Enterprise and Infrastructure Security will develop knowledge and skills that may be useful to these careers:
Software Security Engineer
Software security engineers design, implement, and maintain security measures in software applications. They also work to ensure that software applications are secure and compliant with all relevant regulations. This course can help build a foundation for a career as a software security engineer by providing an understanding of the latest security threats and how to mitigate them. Additionally, the course covers compliance frameworks and other important aspects of enterprise security.
Cybersecurity Engineer
Cybersecurity engineers design and implement security systems to protect an organization's networks, systems, and data. They also work to identify and respond to security threats. This course can help build a foundation for a career as a cybersecurity engineer by providing an understanding of the latest security threats and how to mitigate them. Additionally, the course covers hybrid cloud security, blockchain security, and other important aspects of modern enterprise cybersecurity.
Cloud Security Architect
Cloud security architects design and implement security measures to protect cloud-based systems and data. They also work to ensure that cloud-based systems are compliant with all relevant regulations. This course can help build a foundation for a career as a cloud security architect by providing an understanding of the latest security threats and how to mitigate them. Additionally, the course covers hybrid cloud security and other important aspects of modern enterprise cybersecurity.
Blockchain Developer
Blockchain developers design and develop blockchain-based applications. They also work to ensure that blockchain-based applications are secure and scalable. This course can help build a foundation for a career as a blockchain developer by providing an understanding of the latest security threats and how to mitigate them. Additionally, the course covers blockchain security and other important aspects of modern enterprise cybersecurity.
Mobile Security Analyst
Mobile security analysts assess the security of mobile devices and applications. They also develop and implement security measures to protect mobile devices and applications from threats. This course can help build a foundation for a career as a mobile security analyst by providing an understanding of the latest security threats and how to mitigate them. Additionally, the course covers mobile security and other important aspects of modern enterprise cybersecurity.
Security Architect
Security architects design and implement security measures to protect an organization's networks, systems, and data. They also work to ensure that security measures are aligned with the organization's business goals. This course can help build a foundation for a career as a security architect by providing an understanding of the latest security threats and how to mitigate them. Additionally, the course covers compliance frameworks and other important aspects of enterprise security.
Information Security Risk Analyst
Information security risk analysts assess an organization's security risks and develop strategies to mitigate those risks. They also work to ensure that the organization's security measures are effective and aligned with the organization's business goals. This course can help build a foundation for a career as an information security risk analyst by providing an understanding of the latest security threats and how to mitigate them. Additionally, the course covers compliance frameworks and other important aspects of enterprise security.
Security Engineer
Security engineers design, implement, and maintain security systems to protect an organization's networks, systems, and data. They also work to ensure that security systems are aligned with the organization's business goals. This course can help build a foundation for a career as a security engineer by providing an understanding of the latest security threats and how to mitigate them. Additionally, the course covers compliance frameworks and other important aspects of enterprise security.
Security Analyst
Security analysts assess an organization's security status and develop security measures to protect its systems and data. They may also conduct security audits to identify vulnerabilities and recommend corrective actions. This course can help build a foundation for a career as a security analyst by providing an understanding of the latest security threats and how to mitigate them. Additionally, the course covers compliance frameworks and other important aspects of enterprise security.
Security Consultant
Security consultants provide advice to organizations on how to improve their security posture. They may also conduct security assessments and recommend corrective actions. This course can help build a foundation for a career as a security consultant by providing an understanding of the latest security threats and how to mitigate them. Additionally, the course covers compliance frameworks and other important aspects of enterprise security.
Privacy Officer
Privacy officers are responsible for protecting an organization's privacy interests. They may also work to develop and implement privacy policies and procedures. This course may be useful for those who wish to become privacy officers by providing an understanding of the latest security threats and how to mitigate them. Additionally, the course covers compliance frameworks and other important aspects of enterprise security.
Security Program Manager
Security program managers plan and implement an organization's security program. They also work to ensure that the security program is effective and aligned with the organization's business goals. This course may be useful for those who wish to become security program managers by providing an understanding of the latest security threats and how to mitigate them. Additionally, the course covers compliance frameworks and other important aspects of enterprise security.
Security Operations Manager
Security operations managers oversee the day-to-day operations of an organization's security program. They also work to identify and respond to security threats. This course may be useful for those who wish to become security operations managers by providing an understanding of the latest security threats and how to mitigate them. Additionally, the course covers compliance frameworks and other important aspects of enterprise security.
Data Protection Officer
Data protection officers are responsible for ensuring that an organization complies with all relevant data protection regulations. They may also work to develop and implement data protection policies and procedures. This course may be useful for those who wish to become data protection officers by providing an understanding of the latest security threats and how to mitigate them. Additionally, the course covers compliance frameworks and other important aspects of enterprise security.
Information Security Manager
Information security managers develop and implement security policies and procedures to protect an organization's data and systems. They also oversee the implementation of security technologies and work to ensure that the organization is compliant with all relevant regulations. This course may be useful for those who wish to become information security managers by providing an understanding of the latest security threats and how to mitigate them. Additionally, the course covers compliance frameworks and other important aspects of enterprise security.

Reading list

We've selected seven books that we think will supplement your learning. Use these to develop background knowledge, enrich your coursework, and gain a deeper understanding of the topics covered in Enterprise and Infrastructure Security.
Provides a comprehensive guide to cloud security concepts and practices. It aligns with the course's coverage of cloud security and can serve as a valuable reference for implementing secure cloud solutions.
Offers practical advice and guidance on planning for a career in cybersecurity. It aligns with the course's concluding module on career planning and can serve as a valuable resource for students seeking career advice and insights.
Provides a fascinating look at the human element of security. It valuable resource for anyone who wants to learn more about how to protect themselves from social engineering attacks.
Provides a comprehensive overview of security awareness for employees. It valuable resource for organizations that want to improve their security posture by educating their employees about security risks.
Provides a comprehensive overview of computer security. It valuable resource for anyone who wants to learn more about the foundations of computer security.
Provides a comprehensive overview of cryptography and network security. It valuable resource for anyone who wants to learn more about the foundations of cryptography and network security.

Share

Help others find this course page by sharing it with your friends and followers:

Similar courses

Similar courses are unavailable at this time. Please try again later.
Our mission

OpenCourser helps millions of learners each year. People visit us to learn workspace skills, ace their exams, and nurture their curiosity.

Our extensive catalog contains over 50,000 courses and twice as many books. Browse by search, by topic, or even by career interests. We'll match you to the right resources quickly.

Find this site helpful? Tell a friend about us.

Affiliate disclosure

We're supported by our community of learners. When you purchase or subscribe to courses and programs or purchase books, we may earn a commission from our partners.

Your purchases help us maintain our catalog and keep our servers humming without ads.

Thank you for supporting OpenCourser.

© 2016 - 2025 OpenCourser