Save for later

Real-Time Cyber Threat Detection and Mitigation

Introduction to Cyber Security,

This course introduces real-time cyber security techniques and methods in the context of the TCP/IP protocol suites. Explanation of some basic TCP/IP security hacks is used to introduce the need for network security solutions such as stateless and stateful firewalls. Learners will be introduced to the techniques used to design and configure firewall solutions such as packet filters and proxies to protect enterprise assets. Perimeter solutions such as firewalls and intrusion prevention systems are shown to have significant drawbacks in common enterprise environments. The result of such weakness is shown to often exist as advanced persistent threats (APTs) from nation-state actors. Such attacks, as well as DDOS and third-party attacks, are shown to have potential solutions for modern enterprise.
Get Details and Enroll Now

OpenCourser is an affiliate partner of Coursera and may earn a commission when you buy through our links.

Get a Reminder

Send to:
Rating 4.7 based on 32 ratings
Length 5 weeks
Starts Jun 26 (44 weeks ago)
Cost $49
From New York University Tandon School of Engineering, New York University via Coursera
Instructor Dr. Edward G. Amoroso
Download Videos On all desktop and mobile devices
Language English
Subjects Programming IT & Networking
Tags Computer Science Computer Security And Networks

Get a Reminder

Send to:

Similar Courses

What people are saying

threat detection

Very good course to start with for Real-Time Cyber Threat Detection and Mitigation.

Great insight into real time cyber threat detection.

doing mostly web application

Doing mostly Web Application Attacks, OSINT.

not simply reading off

Not simply reading off a script.

case studies he discussed

The case studies he discussed in the videos highlight vulnerabilities that large enterprises have to defend.

engaging manner without requiring

Prof teaches basic concepts in an engaging manner without requiring much technical background.

issues like man-in-middle attacks

But this course made me understand the fundamental problems in protocols that are causing big issues like man-in-middle attacks, IP Spoofing, Email Spoofing.

virtualized software driven perimeters

His talk at the IEEE 5G conference at Princeton along with his paper added a lot of value to the concepts around virtualized software driven perimeters.

الأمنالسبراني واوصي كل شخص

Explains the basics but still very well and made it simple to understand, I would recommend the staff to check some things that where also commented in the forum انا سعد جدا بهذا الدوره وتعلمت منها المثير في مجال الأمنالسبراني واوصي كل شخص عليك ان تبادر الي موقع كورسيرا I have trialed a few of the better known online courses.

الدوره وتعلمت منها المثير

ان تبادر الي موقع

انا سعد جدا بهذا

dorothy denning gave

The paper by Dr. Dorothy Denning gave a very thorough and theoretical treatment to aspects around intrusion detection and prevention.

Careers

An overview of related careers and their average salaries in the US. Bars indicate income percentile.

Realtime Viz Artist $90k

Court Reporter/Realtime Reporter $93k

TPF Realtime Coverage Programmer/Analyst Lead $108k

Realtime Highlight Publisher Manager $111k

Realtime Products Design Engineer $127k

Realtime Platform Engineer $144k

Write a review

Your opinion matters. Tell us what you think.

Rating 4.7 based on 32 ratings
Length 5 weeks
Starts Jun 26 (44 weeks ago)
Cost $49
From New York University Tandon School of Engineering, New York University via Coursera
Instructor Dr. Edward G. Amoroso
Download Videos On all desktop and mobile devices
Language English
Subjects Programming IT & Networking
Tags Computer Science Computer Security And Networks

Similar Courses

Sorted by relevance

Like this course?

Here's what to do next:

  • Save this course for later
  • Get more details from the course provider
  • Enroll in this course
Enroll Now