Learners will identify risks and learn how to protect systems given real world system architectures. Learners will also use their knowledge to assess real world data breaches to determine what threats and exploits caused the data breaches and also what defense mechanisms would have prevented the breaches. Finally, learners will use the proactive security knowledge they gained to exploit a live system to show the risks of insecure web applications.
Cybersecurity for Business Specialization
Discover the practical side of computer security. Identify what threatens your business and master how to practically defend against those threats.
About This Specialization
Follow the suggested order or choose your own.
Designed to help you practice and apply the skills you learn.
Highlight your new skills on your resume or LinkedIn.
- Beginner Specialization.
- No prior experience required.
Introduction to Cybersecurity for BusinessCurrent session: Jan 15
About the CourseThe world runs computers. From small to large businesses, from the CEO down to level 1 support staff, everyone uses computers. This course is designed to give you a practical perspective on computer security. This course approaches computer sec
Cyber Threats and Attack VectorsCurrent session: Jan 15
About the CourseData breaches occur nearly every day. From very large retailers, down to your fantasy football website, and anywhere in between, they have been compromised in some way. How did the attackers get in? What did they do with the data they compromised? Wha
Detecting and Mitigating Cyber Threats and AttacksCurrent session: Jan 15
About the CourseComputer attacks and data breaches are inevitable. It seems like every day a data breach occurs and the victims of the data breach suffer. Their information is stolen or posted online. The company’s or businesses who had the breach go on, learn
Proactive Computer SecurityCurrent session: Jan 15
About the CourseI’ve heard this before – “I’m not sure my computer security practices are working”. I reply “Have you tested them?” This course is the fourth and final course in the Practical Computer Security specialization. In this course, you’ll lear