Becoming a Cybersecurity Consultant
- Offered byCoursera
Becoming a Cybersecurity Consultant at Coursera Overview
Duration | 8 hours |
Start from | Start Now |
Total fee | Free |
Mode of learning | Online |
Official Website | Explore Free Course |
Credential | Certificate |
Becoming a Cybersecurity Consultant at Coursera Highlights
- Flexible deadlines Reset deadlines in accordance to your schedule.
- Shareable Certificate Earn a Certificate upon completion
- 100% online Start instantly and learn at your own schedule.
- Coursera Labs Includes hands on learning projects. Learn more about Coursera Labs External Link
- Intermediate Level 3 years of practical experience in the subject of Cybersecurity (Including but not limited to Cybersecurity Consulting, Cybersecurity Management etc)
- Approx. 8 hours to complete
- English Subtitles: English
Becoming a Cybersecurity Consultant at Coursera Course details
- The course targets individuals planning to develop a career in cybersecurity, middle managers and executives. The course covers the following main learning objectives: Threats - Technology - Economics and it is structured in 2 parts: an online part and a face-to-face/live webinar part.
- The present online course is designed to cover theoretical concepts a Cybersecurity Consultant (medium level) should know. It is structured in 4 modules and is aimed at being finished in about 3-4 weeks-time.
- The course contains a set of quizzes with a pass mark of 60%. Learners interested to get the certificate should pass all the quizzes and get a total score of 70% or above.
- The learners finalizing the online module could develop further their knowledge and skills by attending a face-to-face / live webinar during which the theoretical concepts will be further developed via case studies and hands on exercises. More information on the webinar could be found at https://professionalschool.eitdigital.eu/cybersecurity-consultant.
- By finalizing this course and attending the face-to-face /live webinar complementary module you will acquire the knowledge and develop the skills needed in view of applying for the Cybersecurity Consultant Skills Certification Scheme (C3 by CONCORDIA) ran in conjunction to this course. More information could be found at https://www.concordia-h2020.eu/becoming-a-cybersecurity-consultant/.
- Except otherwise noted, the reuse of these presentations/videos is authorized under the Creative Commons Attribution 4.0 International (CC BY 4.0) license (https://creativecommons.org/licenses/by/4.0/). This means that reuse is allowed provided appropriate credit is given and any changes are indicated. For any use or reproduction of material that is not owned by the CONCORDIA partner providing the respective course, permission must be sought directly from the copyright holders.
- The course Becoming Cybersecurity Consultant was developed as part of the CONCORDIA project, and it is a joint effort of the following partners: University of Milan, University of Lorraine, University of Zurich, University of Insubria, Industrial Systems Institute Athens, Bitdefender, TUV IT Austria, EIT Digital.
- The CONCORDIA project is funded from the European Union's Horizon 2020 Research and Innovation program under Grant Agreement No 830927.
Becoming a Cybersecurity Consultant at Coursera Curriculum
INTRODUCTION
The Cybersecurity Consultant Role profile
Introduction and basic terminology
CIA triad & additional security properties
Security Attacks and Threats
Security Services and Security Mechanisms
Introduction to privacy preserving data management
Privacy-preserving DBMSs
Privacy-preserving data sharing
Anonymization techniques and related utility measures
Principles of Risk Management, Module 1
Principles of Risk Management, Module 2
CIA Triad and Security principles
Privacy principles
Principles of Risk Management
Cybersecurity Offensive Methods
Introduction
Cyberattack lifecycle: Before the Attack
Cyberattack lifecycle: During the Attack
Cyberattack lifecycle: After the Attack
Introduction
Recent attacks
Key Findings
Overview of Network attacks, Module 1
Overview of Network attacks, Module 2
Introduction
Cloud Technology
Cloud Top Threats
SDN/NFV Technology
SDN/NFV Top Threats
IoT Technology
IoT Top Threats
Cybersecurity lifecycle: Before the attack
Cyberattack lifecycle: During and After the Attack
Emerging Security Issues and Evolving Attacks
Overview of Network attacks
Cloud Quiz
SDN/NFV Quiz
IoT Quiz
Cybersecurity Defensive Methods
Introduction and Secure Development Lifecycle
Secure Design Good Practices
Secure Design Principles
Introduction
Black-Box Methods
Grey-Box Methods
White-Box Methods
Overview of Network Protection Methods
IDS and SIEM
OS/Application Protection Methods
Introduction
Basic Data Concepts
Economic Aspects
Defenses
Security by Design Quiz
Security Design Principles
Black-Box Methods
Grey-Box Methods
White-Box Methods
Overview of Network Protection Methods
IDS and SIEM quiz
Application/OS Protection Methods Quiz
Data Protection and Security
Introduction and Motivation
Cybersecurity Economics
Gordon Loeb Model (GL) and Return On Security Investment (ROSI)
Cybersecurity economics