Coursera
Coursera Logo

Becoming a Cybersecurity Consultant 

  • Offered byCoursera

Becoming a Cybersecurity Consultant
 at 
Coursera 
Overview

Duration

8 hours

Start from

Start Now

Total fee

Free

Mode of learning

Online

Official Website

Explore Free Course External Link Icon

Credential

Certificate

Becoming a Cybersecurity Consultant
 at 
Coursera 
Highlights

  • Flexible deadlines Reset deadlines in accordance to your schedule.
  • Shareable Certificate Earn a Certificate upon completion
  • 100% online Start instantly and learn at your own schedule.
  • Coursera Labs Includes hands on learning projects. Learn more about Coursera Labs External Link
  • Intermediate Level 3 years of practical experience in the subject of Cybersecurity (Including but not limited to Cybersecurity Consulting, Cybersecurity Management etc)
  • Approx. 8 hours to complete
  • English Subtitles: English
Read more
Details Icon

Becoming a Cybersecurity Consultant
 at 
Coursera 
Course details

More about this course
  • The course targets individuals planning to develop a career in cybersecurity, middle managers and executives. The course covers the following main learning objectives: Threats - Technology - Economics and it is structured in 2 parts: an online part and a face-to-face/live webinar part.
  • The present online course is designed to cover theoretical concepts a Cybersecurity Consultant (medium level) should know. It is structured in 4 modules and is aimed at being finished in about 3-4 weeks-time.
  • The course contains a set of quizzes with a pass mark of 60%. Learners interested to get the certificate should pass all the quizzes and get a total score of 70% or above.
  • The learners finalizing the online module could develop further their knowledge and skills by attending a face-to-face / live webinar during which the theoretical concepts will be further developed via case studies and hands on exercises. More information on the webinar could be found at https://professionalschool.eitdigital.eu/cybersecurity-consultant.
  • By finalizing this course and attending the face-to-face /live webinar complementary module you will acquire the knowledge and develop the skills needed in view of applying for the Cybersecurity Consultant Skills Certification Scheme (C3 by CONCORDIA) ran in conjunction to this course. More information could be found at https://www.concordia-h2020.eu/becoming-a-cybersecurity-consultant/.
  • Except otherwise noted, the reuse of these presentations/videos is authorized under the Creative Commons Attribution 4.0 International (CC BY 4.0) license (https://creativecommons.org/licenses/by/4.0/). This means that reuse is allowed provided appropriate credit is given and any changes are indicated. For any use or reproduction of material that is not owned by the CONCORDIA partner providing the respective course, permission must be sought directly from the copyright holders.
  • The course Becoming Cybersecurity Consultant was developed as part of the CONCORDIA project, and it is a joint effort of the following partners: University of Milan, University of Lorraine, University of Zurich, University of Insubria, Industrial Systems Institute Athens, Bitdefender, TUV IT Austria, EIT Digital.
  • The CONCORDIA project is funded from the European Union's Horizon 2020 Research and Innovation program under Grant Agreement No 830927.
Read more

Becoming a Cybersecurity Consultant
 at 
Coursera 
Curriculum

INTRODUCTION

The Cybersecurity Consultant Role profile

Introduction and basic terminology

CIA triad & additional security properties

Security Attacks and Threats

Security Services and Security Mechanisms

Introduction to privacy preserving data management

Privacy-preserving DBMSs

Privacy-preserving data sharing

Anonymization techniques and related utility measures

Principles of Risk Management, Module 1

Principles of Risk Management, Module 2

CIA Triad and Security principles

Privacy principles

Principles of Risk Management

Cybersecurity Offensive Methods

Introduction

Cyberattack lifecycle: Before the Attack

Cyberattack lifecycle: During the Attack

Cyberattack lifecycle: After the Attack

Introduction

Recent attacks

Key Findings

Overview of Network attacks, Module 1

Overview of Network attacks, Module 2

Introduction

Cloud Technology

Cloud Top Threats

SDN/NFV Technology

SDN/NFV Top Threats

IoT Technology

IoT Top Threats

Cybersecurity lifecycle: Before the attack

Cyberattack lifecycle: During and After the Attack

Emerging Security Issues and Evolving Attacks

Overview of Network attacks

Cloud Quiz

SDN/NFV Quiz

IoT Quiz

Cybersecurity Defensive Methods

Introduction and Secure Development Lifecycle

Secure Design Good Practices

Secure Design Principles

Introduction

Black-Box Methods

Grey-Box Methods

White-Box Methods

Overview of Network Protection Methods

IDS and SIEM

OS/Application Protection Methods

Introduction

Basic Data Concepts

Economic Aspects

Defenses

Security by Design Quiz

Security Design Principles

Black-Box Methods

Grey-Box Methods

White-Box Methods

Overview of Network Protection Methods

IDS and SIEM quiz

Application/OS Protection Methods Quiz

Data Protection and Security

Introduction and Motivation

Cybersecurity Economics

Gordon Loeb Model (GL) and Return On Security Investment (ROSI)

Cybersecurity economics

Becoming a Cybersecurity Consultant
 at 
Coursera 
Admission Process

    Important Dates

    May 25, 2024
    Course Commencement Date

    Other courses offered by Coursera

    – / –
    3 months
    Beginner
    – / –
    20 hours
    Beginner
    – / –
    2 months
    Beginner
    – / –
    3 months
    Beginner
    View Other 6715 CoursesRight Arrow Icon
    qna

    Becoming a Cybersecurity Consultant
     at 
    Coursera 

    Student Forum

    chatAnything you would want to ask experts?
    Write here...