Acerca de este Curso
4.7
148 calificaciones
19 revisiones
Programa Especializado
100 % en línea

100 % en línea

Comienza de inmediato y aprende a tu propio ritmo.
Fechas límite flexibles

Fechas límite flexibles

Restablece las fechas límite en función de tus horarios.
Nivel intermedio

Nivel intermedio

Horas para completar

Aprox. 11 horas para completar

Sugerido: 10 hours/week...
Idiomas disponibles

Inglés (English)

Subtítulos: Inglés (English)
Programa Especializado
100 % en línea

100 % en línea

Comienza de inmediato y aprende a tu propio ritmo.
Fechas límite flexibles

Fechas límite flexibles

Restablece las fechas límite en función de tus horarios.
Nivel intermedio

Nivel intermedio

Horas para completar

Aprox. 11 horas para completar

Sugerido: 10 hours/week...
Idiomas disponibles

Inglés (English)

Subtítulos: Inglés (English)

Programa - Qué aprenderás en este curso

Semana
1
Horas para completar
5 horas para completar

Basic Network Security

This module introduces the basics of TCP/IP for security, including firewall design and use....
Reading
13 videos (Total 71 minutos), 5 readings, 1 quiz
Video13 videos
Assignments and Reading2m
Security Through Obscurity4m
TCP/IP Evolution and Security6m
TCP/IP Overview8m
IP Spoofing5m
TCP Sequence Number Attack5m
Packet Flooding5m
Packet Sniffing5m
SYN Packets for Access Control5m
Definition of a Firewall5m
Firewall: Stateful versus Stateless5m
Interview: John Viega8m
Reading5 lecturas
Required: “Network Firewalls,” Steve Bellovin and Bill Cheswick30m
Required: “Introduction to TCP/IP Network Attacks,” Guang Yang45m
Video: “Hacking DNS,” Eli the Computer Guy46m
Suggested: Introduction to Cyber Security, Edward Amoroso and Matthew Amoroso, (Ch. 17 - 18)30m
Suggested: TCP/IP Illustrated Volume 1 (2nd Edition), Kevin Fall and W. Richard Stevens, (Ch. 17 – 18)30m
Quiz1 ejercicio de práctica
Module 1 Quiz20m
Semana
2
Horas para completar
3 horas para completar

More Advanced Network Security Technologies

This module introduces packet filters, firewall rule sets, proxies, and additional network security methods....
Reading
12 videos (Total 65 minutos), 4 readings, 1 quiz
Video12 videos
Packet Filtering7m
Sample Packet Filtering and Reference Architecture5m
Default Firewall Block4m
Firewall Rules to Allow Outbound Web Browsing4m
Firewall Rules to Allow Telnet and Other TCP Services3m
Establishing Corporate Policy Rules4m
FTP Protocol6m
Firewall Rules for FTP3m
Application Proxy Filtering6m
Forward and Reverse Proxies4m
Interview: Roger Piqueras Jover11m
Reading4 lecturas
Required: “Anomaly-based Network Intrusion Detection: Techniques, Systems, and Challenges.”20m
Required: “Intrusion Detection via Static Analysis,” Wagner and Dean25m
Video: “How Does Intrusion Prevention Systems Work,” 2013 - SourceFire6m
Suggested: Introduction to Cyber Security, Edward Amoroso and Matthew Amoroso, (Chapters 19 - 20)30m
Quiz1 ejercicio de práctica
Module 2 Quiz20m
Semana
3
Horas para completar
3 horas para completar

Network Security Architectures

This module introduces the foundations firewall architectures, intrusion detection, and SOC design....
Reading
11 videos (Total 68 minutos), 4 readings, 1 quiz
Video11 videos
Firewall Architectures (Part 1)6m
Firewall Architectures (Part 2)6m
Management by Exception5m
System Auditing6m
Basics of Intrusion Detection7m
Signature Versus Behavioral Detection5m
IDS Versus IPS6m
Design of SIEM5m
Design of a SOC6m
Interview: Dino Dai Zovi9m
Reading4 lecturas
Required: “An Evening with Berferd,” Bill Cheswick20m
Required: “IDES Model,” Dorothy Denning30m
Video: “DEFCAMP 2015 – Building a Security Operations Center,”32m
Suggested: Introduction to Cyber Security, Edward Amoroso and Matthew Amoroso, (Ch. 21 - 22)30m
Quiz1 ejercicio de práctica
Module 3 Quiz20m
Semana
4
Horas para completar
4 horas para completar

Enterprise Network Security

This module introduces the limitations of perimeters, and the challenges in the enterprise of dealing with threats such as DDOS and APT....
Reading
12 videos (Total 70 minutos), 5 readings, 2 quizzes
Video12 videos
Practical Limitations of Perimeter7m
APT Schema Through Perimeter Holes6m
Third Party Security5m
Target APT Attack5m
Large Government Agency Attack5m
Layer 3 DDOS Protection6m
Layer 7 Application Level DDOS Risk3m
Large Financial Website DDOS Attacks4m
Network Security Industry Overview2m
Interview: Ray Cheng - Pt. 113m
Interview: Ray Cheng - Pt. 26m
Reading5 lecturas
Required: “From the Enterprise Perimeter to Mobility Enabled Cloud,” Ed Amoroso, IEEE25m
Required: “A Study of Advanced Persistent Threats,” Chen, Desmet, and Huygens30m
Video: “IEEEtv – 5G Summit,” Ed Amoroso, Princeton, 201530m
Suggested: Introduction to Cyber Security, Edward Amoroso and Matthew Amoroso, (Ch. 23 - 24)30m
Quiz Directions5m
Quiz2 ejercicios de práctica
Module 4 Quiz20m
Select the Best Migration Choice:12m
4.7
19 revisionesChevron Right
Beneficio de la carrera

33%

consiguió un beneficio tangible en su carrera profesional gracias a este curso

Principales revisiones

por ASNov 5th 2018

Very good course providing basic knowledge for understanding the ways of cyber threat detections & mitigation so it is easier and more intuitive continuing exploration of the field by your own

por DKAug 12th 2018

I used this course a refresh for established cyber skills, its been a welcome change to have such an enthusiastic lecturer and revisit some of the cornerstones of cyber.

Instructor

Avatar

Dr. Edward G. Amoroso

Research Professor, NYU and CEO, TAG Cyber LLC
Computer Science

Acerca de New York University Tandon School of Engineering

Tandon offers comprehensive courses in engineering, applied science and technology. Each course is rooted in a tradition of invention and entrepreneurship....

Acerca del programa especializado Introduction to Cyber Security

Introduction to Cyber Security was designed to help learners develop a deeper understanding of modern information and system protection technology and methods. The learning outcome is simple: We hope learners will develop a lifelong passion and appreciation for cyber security, which we are certain will help in future endeavors. Students, developers, managers, engineers, and even private citizens will benefit from this learning experience. Special customized interviews with industry partners were included to help connect the cyber security concepts to live business experiences....
Introduction to Cyber Security

Preguntas Frecuentes

  • Una vez que te inscribes para obtener un Certificado, tendrás acceso a todos los videos, cuestionarios y tareas de programación (si corresponde). Las tareas calificadas por compañeros solo pueden enviarse y revisarse una vez que haya comenzado tu sesión. Si eliges explorar el curso sin comprarlo, es posible que no puedas acceder a determinadas tareas.

  • Cuando te inscribes en un curso, obtienes acceso a todos los cursos que forman parte del Programa especializado y te darán un Certificado cuando completes el trabajo. Se añadirá tu Certificado electrónico a la página Logros. Desde allí, puedes imprimir tu Certificado o añadirlo a tu perfil de LinkedIn. Si solo quieres leer y visualizar el contenido del curso, puedes auditar el curso sin costo.

¿Tienes más preguntas? Visita el Centro de Ayuda al Alumno.