À propos de ce cours

27,878 consultations récentes

Résultats de carrière des étudiants

75%

ont bénéficié d'un avantage concret dans leur carrières grâce à ce cours

17%

a obtenu une augmentation de salaire ou une promotion
Certificat partageable
Obtenez un Certificat lorsque vous terminez
100 % en ligne
Commencez dès maintenant et apprenez aux horaires qui vous conviennent.
Dates limites flexibles
Réinitialisez les dates limites selon votre disponibilité.
Niveau intermédiaire
Approx. 14 heures pour terminer
Anglais
Sous-titres : Anglais

Résultats de carrière des étudiants

75%

ont bénéficié d'un avantage concret dans leur carrières grâce à ce cours

17%

a obtenu une augmentation de salaire ou une promotion
Certificat partageable
Obtenez un Certificat lorsque vous terminez
100 % en ligne
Commencez dès maintenant et apprenez aux horaires qui vous conviennent.
Dates limites flexibles
Réinitialisez les dates limites selon votre disponibilité.
Niveau intermédiaire
Approx. 14 heures pour terminer
Anglais
Sous-titres : Anglais

Offert par

Logo New York University

New York University

Programme du cours : ce que vous apprendrez dans ce cours

Évaluation du contenuThumbs Up97%(1,394 notes)Info
Semaine
1

Semaine 1

5 heures pour terminer

Basic Network Security

5 heures pour terminer
13 vidéos (Total 71 min), 5 lectures, 1 quiz
13 vidéos
Assignments and Reading2 min
Security Through Obscurity4 min
TCP/IP Evolution and Security6 min
TCP/IP Overview8 min
IP Spoofing5 min
TCP Sequence Number Attack5 min
Packet Flooding5 min
Packet Sniffing5 min
SYN Packets for Access Control5 min
Definition of a Firewall5 min
Firewall: Stateful versus Stateless5 min
Interview: John Viega8 min
5 lectures
Required: “Network Firewalls,” Steve Bellovin and Bill Cheswick30 min
Required: “Introduction to TCP/IP Network Attacks,” Guang Yang45 min
Video: “Hacking DNS,” Eli the Computer Guy46 min
Suggested: Introduction to Cyber Security, Edward Amoroso and Matthew Amoroso, (Ch. 17 - 18)30 min
Suggested: TCP/IP Illustrated Volume 1 (2nd Edition), Kevin Fall and W. Richard Stevens, (Ch. 17 – 18)30 min
1 exercice pour s'entraîner
Module 1 Quiz20 min
Semaine
2

Semaine 2

3 heures pour terminer

More Advanced Network Security Technologies

3 heures pour terminer
12 vidéos (Total 65 min), 4 lectures, 1 quiz
12 vidéos
Packet Filtering7 min
Sample Packet Filtering and Reference Architecture5 min
Default Firewall Block4 min
Firewall Rules to Allow Outbound Web Browsing4 min
Firewall Rules to Allow Telnet and Other TCP Services3 min
Establishing Corporate Policy Rules4 min
FTP Protocol6 min
Firewall Rules for FTP3 min
Application Proxy Filtering6 min
Forward and Reverse Proxies4 min
Interview: Roger Piqueras Jover11 min
4 lectures
Required: “Anomaly-based Network Intrusion Detection: Techniques, Systems, and Challenges.”20 min
Required: “Intrusion Detection via Static Analysis,” Wagner and Dean25 min
Video: “How Does Intrusion Prevention Systems Work,” 2013 - SourceFire6 min
Suggested: Introduction to Cyber Security, Edward Amoroso and Matthew Amoroso, (Chapters 19 - 20)30 min
1 exercice pour s'entraîner
Module 2 Quiz20 min
Semaine
3

Semaine 3

3 heures pour terminer

Network Security Architectures

3 heures pour terminer
11 vidéos (Total 68 min), 4 lectures, 1 quiz
11 vidéos
Firewall Architectures (Part 1)6 min
Firewall Architectures (Part 2)6 min
Management by Exception5 min
System Auditing6 min
Basics of Intrusion Detection7 min
Signature Versus Behavioral Detection5 min
IDS Versus IPS6 min
Design of SIEM5 min
Design of a SOC6 min
Interview: Dino Dai Zovi9 min
4 lectures
Required: “An Evening with Berferd,” Bill Cheswick20 min
Required: “IDES Model,” Dorothy Denning30 min
Video: “DEFCAMP 2015 – Building a Security Operations Center,”32 min
Suggested: Introduction to Cyber Security, Edward Amoroso and Matthew Amoroso, (Ch. 21 - 22)30 min
1 exercice pour s'entraîner
Module 3 Quiz20 min
Semaine
4

Semaine 4

4 heures pour terminer

Enterprise Network Security

4 heures pour terminer
12 vidéos (Total 70 min), 5 lectures, 2 quiz
12 vidéos
Practical Limitations of Perimeter7 min
APT Schema Through Perimeter Holes6 min
Third Party Security5 min
Target APT Attack5 min
Large Government Agency Attack5 min
Layer 3 DDOS Protection6 min
Layer 7 Application Level DDOS Risk3 min
Large Financial Website DDOS Attacks4 min
Network Security Industry Overview2 min
Interview: Ray Cheng - Pt. 113 min
Interview: Ray Cheng - Pt. 26 min
5 lectures
Required: “From the Enterprise Perimeter to Mobility Enabled Cloud,” Ed Amoroso, IEEE25 min
Required: “A Study of Advanced Persistent Threats,” Chen, Desmet, and Huygens30 min
“Implementing Zero Trust,” Ed Amoroso, 201830 min
Suggested: Introduction to Cyber Security, Edward Amoroso and Matthew Amoroso, (Ch. 23 - 24)30 min
Quiz Directions5 min
2 exercices pour s'entraîner
Module 4 Quiz20 min
Select the Best Migration Choice:12 min

Avis

Meilleurs avis pour REAL-TIME CYBER THREAT DETECTION AND MITIGATION

Voir tous les avis

À propos du Spécialisation Introduction to Cyber Security

Introduction to Cyber Security was designed to help learners develop a deeper understanding of modern information and system protection technology and methods. The learning outcome is simple: We hope learners will develop a lifelong passion and appreciation for cyber security, which we are certain will help in future endeavors. Students, developers, managers, engineers, and even private citizens will benefit from this learning experience. Special customized interviews with industry partners were included to help connect the cyber security concepts to live business experiences....
Introduction to Cyber Security

Foire Aux Questions

  • Access to lectures and assignments depends on your type of enrollment. If you take a course in audit mode, you will be able to see most course materials for free. To access graded assignments and to earn a Certificate, you will need to purchase the Certificate experience, during or after your audit. If you don't see the audit option:

    • The course may not offer an audit option. You can try a Free Trial instead, or apply for Financial Aid.

    • The course may offer 'Full Course, No Certificate' instead. This option lets you see all course materials, submit required assessments, and get a final grade. This also means that you will not be able to purchase a Certificate experience.

  • When you enroll in the course, you get access to all of the courses in the Specialization, and you earn a certificate when you complete the work. Your electronic Certificate will be added to your Accomplishments page - from there, you can print your Certificate or add it to your LinkedIn profile. If you only want to read and view the course content, you can audit the course for free.

  • If you subscribed, you get a 7-day free trial during which you can cancel at no penalty. After that, we don’t give refunds, but you can cancel your subscription at any time. See our full refund policy.

  • Yes, Coursera provides financial aid to learners who cannot afford the fee. Apply for it by clicking on the Financial Aid link beneath the "Enroll" button on the left. You'll be prompted to complete an application and will be notified if you are approved. You'll need to complete this step for each course in the Specialization, including the Capstone Project. Learn more.

D'autres questions ? Visitez le Centre d'Aide pour les Etudiants.