Acerca de este Programa Especializado
Cursos 100 % en línea

Cursos 100 % en línea

Comienza de inmediato y aprende a tu propio ritmo.
Cronograma flexible

Cronograma flexible

Establece y mantén fechas de entrega flexibles.
Nivel principiante

Nivel principiante

Some familiarity with IT management and concepts.

Horas para completar

Aprox. 2 meses para completar

Sugerido 8 horas/semana
Idiomas disponibles

Inglés (English)

Subtítulos: Inglés (English)...

Qué aprenderás

  • Check

    Summarize the main purpose of cyber security as a discipline

  • Check

    Summarize the basics of identification and authentication in cyber security

  • Check

    Explain the pros and cons of security through obscurity

  • Check

    Develop a lifelong learning plan for potential careers in cyber security

Habilidades que obtendrás

CryptographyCybersecurityRisk AssessmentCyber DefenseCyber Attacks
Cursos 100 % en línea

Cursos 100 % en línea

Comienza de inmediato y aprende a tu propio ritmo.
Cronograma flexible

Cronograma flexible

Establece y mantén fechas de entrega flexibles.
Nivel principiante

Nivel principiante

Some familiarity with IT management and concepts.

Horas para completar

Aprox. 2 meses para completar

Sugerido 8 horas/semana
Idiomas disponibles

Inglés (English)

Subtítulos: Inglés (English)...

Cómo funciona Programa Especializado

Toma cursos

Un programa especializado de Coursera es un conjunto de cursos que te ayudan a dominar una aptitud. Para comenzar, inscríbete en el programa especializado directamente o échale un vistazo a sus cursos y elige uno con el que te gustaría comenzar. Al suscribirte a un curso que forme parte de un programa especializado, quedarás suscrito de manera automática al programa especializado completo. Puedes completar solo un curso: puedes pausar tu aprendizaje o cancelar tu suscripción en cualquier momento. Visita el panel principal del estudiante para realizar un seguimiento de tus inscripciones a cursos y tu progreso.

Proyecto práctico

Cada programa especializado incluye un proyecto práctico. Necesitarás completar correctamente el proyecto para completar el programa especializado y obtener tu certificado. Si el programa especializado incluye un curso separado para el proyecto práctico, necesitarás completar cada uno de los otros cursos antes de poder comenzarlo.

Obtén un certificado

Cuando completes todos los cursos y el proyecto práctico, obtendrás un Certificado que puedes compartir con posibles empleadores y tu red profesional.

how it works

Hay 4 cursos en este Programa Especializado

Curso1

Introduction to Cyber Attacks

4.7
444 calificaciones
109 revisiones
This course provides learners with a baseline understanding of common cyber security threats, vulnerabilities, and risks. An overview of how basic cyber attacks are constructed and applied to real systems is also included. Examples include simple Unix kernel hacks, Internet worms, and Trojan horses in software utilities. Network attacks such as distributed denial of service (DDOS) and botnet- attacks are also described and illustrated using real examples from the past couple of decades. Familiar analytic models are outlined such as the confidentiality/integrity/availability (CIA) security threat framework, and examples are used to illustrate how these different types of threats can degrade real assets. The course also includes an introduction to basic cyber security risk analysis, with an overview of how threat-asset matrices can be used to prioritize risk decisions. Threats, vulnerabilities, and attacks are examined and mapped in the context of system security engineering methodologies....
Curso2

Cyber Attack Countermeasures

4.8
138 calificaciones
28 revisiones
This course introduces the basics of cyber defense starting with foundational models such as Bell-LaPadula and information flow frameworks. These underlying policy enforcements mechanisms help introduce basic functional protections, starting with authentication methods. Learners will be introduced to a series of different authentication solutions and protocols, including RSA SecureID and Kerberos, in the context of a canonical schema.   The basics of cryptography are also introduced with attention to conventional block ciphers as well as public key cryptography. Important cryptographic techniques such as cipher block chaining and triple-DES are explained. Modern certification authority-based cryptographic support is also discussed and shown to provide basis for secure e-commerce using Secure Sockets Layer (SSL) schemes....
Curso3

Real-Time Cyber Threat Detection and Mitigation

4.7
132 calificaciones
14 revisiones
This course introduces real-time cyber security techniques and methods in the context of the TCP/IP protocol suites. Explanation of some basic TCP/IP security hacks is used to introduce the need for network security solutions such as stateless and stateful firewalls. Learners will be introduced to the techniques used to design and configure firewall solutions such as packet filters and proxies to protect enterprise assets. Perimeter solutions such as firewalls and intrusion prevention systems are shown to have significant drawbacks in common enterprise environments. The result of such weakness is shown to often exist as advanced persistent threats (APTs) from nation-state actors. Such attacks, as well as DDOS and third-party attacks, are shown to have potential solutions for modern enterprise....
Curso4

Enterprise and Infrastructure Security

4.6
101 calificaciones
21 revisiones
This course introduces a series of advanced and current topics in cyber security, many of which are especially relevant in modern enterprise and infrastructure settings. The basics of enterprise compliance frameworks are provided with introduction to NIST and PCI. Hybrid cloud architectures are shown to provide an opportunity to fix many of the security weaknesses in modern perimeter local area networks.   Emerging security issues in blockchain, blinding algorithms, Internet of Things (IoT), and critical infrastructure protection are also described for learners in the context of cyber risk. Mobile security and cloud security hyper-resilience approaches are also introduced. The course completes with some practical advice for learners on how to plan careers in cyber security....

Instructor

Avatar

Dr. Edward G. Amoroso

Research Professor, NYU and CEO, TAG Cyber LLC
Computer Science

Acerca de New York University Tandon School of Engineering

Tandon offers comprehensive courses in engineering, applied science and technology. Each course is rooted in a tradition of invention and entrepreneurship....

Preguntas Frecuentes

  • ¡Sí! Para empezar, haz clic en la tarjeta del curso que te interesa e inscríbete. Puedes inscribirte y completar el curso para obtener un certificado que puedes compartir o puedes acceder al curso como oyente para ver los materiales del curso de manera gratuita. Cuando cancelas la suscripción de un curso que forma parte de un programa especializado, se cancela automáticamente la suscripción de todo el programa especializado. Visita el panel del estudiante para realizar un seguimiento de tu progreso.

  • Este curso es completamente en línea, de modo que no necesitas ir a un aula en persona. Puedes acceder a tus lecciones, lecturas y tareas en cualquier momento y cualquier lugar a través de Internet o tu dispositivo móvil.

  • Este programa especializado no otorga crédito universitario, pero algunas universidades pueden aceptar los Certificados del programa especializado para el crédito. Consulta con tu institución para obtener más información.

  • No, you can take them in any order. You can also take more than one at a time.

¿Tienes más preguntas? Visita el Centro de Ayuda al Alumno.