cybersecurity

  1. Coursera

    Coursera Cybersecurity and Its Ten Domains

    Overview This course is designed to introduce students, working professionals and the community to the exciting field of cybersecurity. Throughout the MOOC, participants will engage in community discourse and online interaction. Participants will gain knowledge and understanding of cybersecurity...
  2. Coursera

    Coursera Introduction to Cyber Attacks

    Overview This course provides learners with a baseline understanding of common cyber security threats, vulnerabilities, and risks. An overview of how basic cyber attacks are constructed and applied to real systems is also included. Examples include simple Unix kernel hacks, Internet worms, and...
  3. Coursera

    Coursera Cyber Attack Countermeasures

    Overview This course introduces the basics of cyber defense starting with foundational models such as Bell-LaPadula and information flow frameworks. These underlying policy enforcements mechanisms help introduce basic functional protections, starting with authentication methods. Learners will be...
  4. Coursera

    Coursera Real-Time Cyber Threat Detection and Mitigation

    Overview This course introduces real-time cyber security techniques and methods in the context of the TCP/IP protocol suites. Explanation of some basic TCP/IP security hacks is used to introduce the need for network security solutions such as stateless and stateful firewalls. Learners will be...
  5. Coursera

    Coursera Enterprise and Infrastructure Security

    Overview This course introduces a series of advanced and current topics in cyber security, many of which are especially relevant in modern enterprise and infrastructure settings. The basics of enterprise compliance frameworks are provided with introduction to NIST and PCI. Hybrid cloud...
  6. Coursera

    Coursera Usable Security

    Overview This course focuses on how to design and build secure systems with a human-centric focus. We will look at basic principles of human-computer interaction, and apply these insights to the design of secure systems with the goal of developing security measures that respect human performance...
  7. Coursera

    Coursera Software Security

    Overview This course we will explore the foundations of software security. We will consider important software vulnerabilities and attacks that exploit them -- such as buffer overflows, SQL injection, and session hijacking -- and we will consider defenses that prevent or mitigate these attacks...
  8. Coursera

    Coursera Cryptography

    Overview This course will introduce you to the foundations of modern cryptography, with an eye toward practical applications. Syllabus Week 1 Introduction to Classical Cryptography Week 2 Computational Secrecy and Principles of Modern Cryptography Week 3 Private-Key Encryption Week 4 Message...
  9. Coursera

    Coursera Hardware Security

    Overview In this course, we will study security and trust from the hardware perspective. Upon completing the course, students will understand the vulnerabilities in current digital system design flow and the physical attacks to these systems. They will learn that security starts from hardware...
  10. edX

    edX Introduction to Cybersecurity

    Overview This course serves as an introduction to the exciting field of cybersecurity. As our daily lives become more and more dependent on Internet-based tools and services, and as those platforms accumulate more of our most sensitive data, the demand grows for experts in the field of...
  11. edX

    edX Cybersecurity: The CISO's View

    Overview The Chief Information Security Officer (CISO) in any given organization serves a leadership position, protecting the data and digital systems that a company’s employees as well as its customers depend upon. This course delves into the role that the CISO plays in cybersecurity...
  12. edX

    edX Building a Cybersecurity Toolkit

    Overview Technologies are always being defeated. If you own an information asset that’s valuable enough to the right adversary, it’s only a matter of time before there’s a breach. Today’s technologies attempt to keep adversaries out, but the sad fact is they will inevitably be defeated. This...
  13. edX

    edX Finding your Cybersecurity Career Path

    Overview In this course, you will focus on the pathways to cybersecurity career success. You will determine your own incoming skills, talent, and deep interests to apply toward a meaningful and informed exploration of 32 Digital Pathways of Cybersecurity. You will complete a self-assessment...
  14. edX

    edX Enterprise Security Fundamentals

    Overview This course is part of the Microsoft Professional Program in Cybersecurity. According to the Wall Street Journal, “All IT Jobs Are Cybersecurity Jobs Now.” In this course, we examine the concept of Red team – Blue team security professionals. You will practice Red team versus Blue...
  15. edX

    edX Threat Detection: Planning for a Secure Enterprise

    Overview This course is part of the Microsoft Professional Program in Cybersecurity. By 2021, worldwide cybercrime damage is expected to reach $6 trillion—double what it cost businesses in 2015. Unapproved apps, unmanaged devices, poor password protection, and other security issues are leaving...
  16. edX

    edX Planning a Security Incident Response

    Overview This course is part of the Microsoft Professional Program in Cybersecurity. This course is designed to help you manage an enterprise security incident, while avoiding common errors, increasing both the effectiveness and efficiency of your incident response efforts. What you'll learn...
  17. edX

    edX Powershell Security Best Practices

    Overview This course is part of the Microsoft Professional Program in Cybersecurity. This course that will teach students how to securely accomplish administrative tasks using Windows PowerShell 5.x. Students will review PowerShell fundamentals, learn Powershell operational security, and...
  18. edX

    edX Managing Identity

    Overview This course is part of the Microsoft Professional Program in Cybersecurity. With identity as the new perimeter in today’s security landscape, it’s important to keep up on the latest ways to manage it. Identity—which defines what protocols you’re allowed to use, who you’re allowed to...
  19. edX

    edX Security in Office 365

    Overview This course is part of the Microsoft Professional Program in Cybersecurity. In Security in Office 365®, you will learn how to plan, implement, and manage the security features of Office 365 in your organization. The Security and compliance center in Office 365 offers a wide variety of...
  20. edX

    edX Securing Data in Azure and SQL Server

    Overview This course is part of the Microsoft Professional Program in Cybersecurity. Given the ever-expanding role of a SQL Server database administrator in today’s security landscape, it’s critical to know how to keep data secure. In this course, join the experts for a look at user...
Top