- Cryptography
- Cybersecurity
- Risk Assessment
- Cyber Defense
- Cyber Attacks
- Information Security (INFOSEC)
- Denial-Of-Service Attack (DOS)
- Public-Key Cryptography
Programa especializado: Introduction to Cyber Security
seguridad cibernética. An introduction to modern information and system protection technology and methods.
ofrecido por
Qué aprenderás
Summarize the main purpose of cyber security as a discipline
Summarize the basics of identification and authentication in cyber security
Explain the pros and cons of security through obscurity
Develop a lifelong learning plan for potential careers in cyber security
Habilidades que obtendrás
Acerca de este Programa Especializado
Proyecto de aprendizaje aplicado
Quizzes and projects for Introduction to Cyber Security were designed to exercise the learner’s understanding and retention of the covered topics. Emphasis is on foundational issues, rather than just memorizing facts. The goal is to help learners develop the habit of properly assessing and improving cyber risk posture in real computing, networking, and software systems. Authentic scenarios are included based on practical enterprise and infrastructure deployments to enhance the learning experience.
Some familiarity with IT management and concepts.
Some familiarity with IT management and concepts.
Cómo funciona el programa especializado
Toma cursos
Un programa especializado de Coursera es un conjunto de cursos que te ayudan a dominar una aptitud. Para comenzar, inscríbete en el programa especializado directamente o échale un vistazo a sus cursos y elige uno con el que te gustaría comenzar. Al suscribirte a un curso que forme parte de un programa especializado, quedarás suscrito de manera automática al programa especializado completo. Puedes completar solo un curso: puedes pausar tu aprendizaje o cancelar tu suscripción en cualquier momento. Visita el panel principal del estudiante para realizar un seguimiento de tus inscripciones a cursos y tu progreso.
Proyecto práctico
Cada programa especializado incluye un proyecto práctico. Necesitarás completar correctamente el proyecto para completar el programa especializado y obtener tu certificado. Si el programa especializado incluye un curso separado para el proyecto práctico, necesitarás completar cada uno de los otros cursos antes de poder comenzarlo.
Obtén un certificado
Cuando completes todos los cursos y el proyecto práctico, obtendrás un Certificado que puedes compartir con posibles empleadores y tu red profesional.

Hay 4 cursos en este Programa Especializado
Introduction to Cyber Attacks
This course provides learners with a baseline understanding of common cyber security threats, vulnerabilities, and risks. An overview of how basic cyber attacks are constructed and applied to real systems is also included. Examples include simple Unix kernel hacks, Internet worms, and Trojan horses in software utilities. Network attacks such as distributed denial of service (DDOS) and botnet- attacks are also described and illustrated using real examples from the past couple of decades.
Cyber Attack Countermeasures
This course introduces the basics of cyber defense starting with foundational models such as Bell-LaPadula and information flow frameworks. These underlying policy enforcements mechanisms help introduce basic functional protections, starting with authentication methods. Learners will be introduced to a series of different authentication solutions and protocols, including RSA SecureID and Kerberos, in the context of a canonical schema.
Real-Time Cyber Threat Detection and Mitigation
This course introduces real-time cyber security techniques and methods in the context of the TCP/IP protocol suites. Explanation of some basic TCP/IP security hacks is used to introduce the need for network security solutions such as stateless and stateful firewalls. Learners will be introduced to the techniques used to design and configure firewall solutions such as packet filters and proxies to protect enterprise assets.
Enterprise and Infrastructure Security
This course introduces a series of advanced and current topics in cyber security, many of which are especially relevant in modern enterprise and infrastructure settings. The basics of enterprise compliance frameworks are provided with introduction to NIST and PCI. Hybrid cloud architectures are shown to provide an opportunity to fix many of the security weaknesses in modern perimeter local area networks.
ofrecido por

New York University
New York University is a leading global institution for scholarship, teaching, and research. Based in New York City with campuses and sites in 14 additional major cities across the world, NYU embraces diversity among faculty, staff and students to ensure the highest caliber, most inclusive educational experience.
Preguntas Frecuentes
¿Cuál es la política de reembolsos?
¿Puedo inscribirme en un solo curso?
¿Hay ayuda económica disponible?
¿Puedo tomar este curso de manera gratuita?
¿Este curso es 100 % en línea? ¿Necesito asistir a alguna clase en persona?
¿Recibiré crédito universitario por completar el programa especializado?
Do I need to take the courses in a specific order?
¿Tienes más preguntas? Visita el Centro de Ayuda al Alumno.