cybersecurity

  1. Coursera

    Coursera IT Security: Defense against the digital dark arts

    This course covers a wide variety of IT security concepts, tools, and best practices. It introduces threats and attacks and the many ways they can show up. We’ll give you some background of encryption algorithms and how they’re used to safeguard data. Then, we’ll dive into the three As of...
  2. Coursera

    Coursera Homeland Security & Cybersecurity Connection - It's Not About the Terrorists

    Overview Welcome to Course 1 in CS4950, Homeland Security and Cybersecruity. In this course we examine the origins of homeland security and its co0nnection with cybersecurity. Homeland security is about safeguarding the United States from domestic catastrophic destruction. Catastrophic...
  3. Coursera

    Coursera Cybersecurity Policy for Water and Electricity Infrastructures

    Overview This course will examine the drinking water and electricity infrastructures, and various policies that have been developed to help guide and strengthen their cybersecurity programs. The drinking water and electricity infrastructures are two of fourteen subsectors comprising what are...
  4. Coursera

    Coursera Cybersecurity Policy for Aviation and Internet Infrastructures

    Overview In this course we will examine the aviation and Internet infrastructures, and various policies that have been developed to help guide and strengthen their cybersecurity programs. The aviation and Internet infrastructures are also considered "lifeline infrastructure" as part of the...
  5. Coursera

    Coursera Homeland Security and Cybersecurity Future

    Overview This course takes a look at the future of cybersecurity with respect to what is being done to lessen the potential for catastrophic destruction resulting from cyber attack on critical infrastructure. In this respect, we take a short survey of potential technological solutions and...
  6. Coursera

    Coursera Cyber Security in Manufacturing

    Overview The nature of digital manufacturing and design (DM&D), and its heavy reliance on creating a digital thread of product and process data and information, makes it a prime target for hackers and counterfeiters. This course will introduce students to why creating a strong and secure...
  7. Coursera

    Coursera Palo Alto Networks Academy Cybersecurity Foundation

    Overview Course Overview: In this course, students will learn the fundamentals of cybersecurity and identify the concepts required to recognize and potentially mitigate attacks against enterprise networks as well as mission critical infrastructure. Course 1 of 5 in the Palo Alto Networks...
  8. Coursera

    Coursera Palo Alto Networks Cybersecurity Gateway I

    Overview PaloAlto Networks Gateway 1 Gateway 1 Course Description: Gateway Part I provides the student with a partial understanding of the fundamental tenants of networking and covers the general concepts involved in maintaining a secure network computing environment. Upon successful...
  9. Coursera

    Coursera Palo Alto Networks Cybersecurity Gateway II

    Overview Cybersecurity Gateway II Gateway II Course Description Gateway II provides the student with a full understanding of the fundamental tenants of networking and covers the general concepts involved in maintaining a secure network computing environment. Upon successful completion of this...
  10. Coursera

    Coursera Palo Alto Networks Cybersecurity Essentials I

    Overview Palo Alto Networks Cybersecurity Essentials I Course Description: Essentials I provides the student with a partial understanding of the fundamental tenants of cybersecurity and covers the general security concepts involved in maintaining a secure network computing environment...
  11. Coursera

    Coursera Palo Alto Networks Cybersecurity Essentials II

    Overview Palo Alto Networks Cybersecurity Essentials II Course Description: Essentials II provides the student with a full understanding of the fundamental tenants of cybersecurity and covers the general security concepts involved in maintaining a secure network computing environment. Students...
  12. Coursera

    Coursera Introduction to Cybersecurity for Business

    Overview The world runs computers. From small to large businesses, from the CEO down to level 1 support staff, everyone uses computers. This course is designed to give you a practical perspective on computer security. This course approaches computer security in a way that anyone can understand...
  13. Coursera

    Coursera Cyber Threats and Attack Vectors

    Overview Data breaches occur nearly every day. From very large retailers, down to your fantasy football website, and anywhere in between, they have been compromised in some way. How did the attackers get in? What did they do with the data they compromised? What should I be concerned with in my...
  14. Coursera

    Coursera Detecting and Mitigating Cyber Threats and Attacks

    Overview Computer attacks and data breaches are inevitable. It seems like every day a data breach occurs and the victims of the data breach suffer. Their information is stolen or posted online. The company’s or businesses who had the breach go on, learn a little from the attack, and just give...
  15. Coursera

    Coursera Proactive Computer Security

    Overview I’ve heard this before – “I’m not sure my computer security practices are working”. I reply “Have you tested them?” This course is the fourth and final course in the Practical Computer Security specialization. In this course, you’ll learn how to proactively test what you have put in...
  16. Coursera

    Coursera International Cyber Conflicts

    Overview By nature, cyber conflicts are an international issue that span across nation-state borders. By the end of the course, you will be able to apply the knowledge gained for analysis and management of international cyber incidents and conflicts including for activities such as development...
  17. Coursera

    Coursera Web Connectivity and Security in Embedded Systems

    Overview Welcome to Web Connectivity and Security in Cyber Physical Systems! In this course, we will explore several technologies that bring modern devices together, facilitating a network of connected things and making devices internet enabled. We will discuss rules, protocols, and standards...
  18. Coursera

    Coursera Cybersecurity and Mobility

    Overview This course is for you if you are interested in transitioning toward a managerial role in cybersecurity and mobility. Through interviews with industry experts in this area, you will be able to analyze innovations powering the rapid spread of information technology and how they present...
  19. Coursera

    Coursera Cybersecurity and the Internet of Things

    Overview Welcome! You may have heard about the Internet of Things (IoT). But you may also have wondered about what it is. Or for that matter, what does it mean to you or an organization. This course is for you if you are curious about the most recent trends and activities in the internet...
  20. Coursera

    Coursera Cybersecurity and the X-Factor

    Overview What is the X-Factor? In Cybersecurity, the X-Factor related to unknown and unpredictable human behavior within and outside of your organization. “No one really knows why humans do what they do”, (David K. Reynolds), and because of this organizations can be unprepared for malicious...
Top