Coursera
Coursera Logo

CISCO Regional Academy ( Centre for Electronic Governance) - Data Security 

  • Offered byCoursera

Data Security
 at 
Coursera 
Overview

Duration

15 hours

Start from

Start Now

Total fee

Free

Mode of learning

Online

Official Website

Explore Free Course External Link Icon

Credential

Certificate

Data Security
 at 
Coursera 
Highlights

  • Flexible deadlines Reset deadlines in accordance to your schedule.
  • Shareable Certificate Earn a Certificate upon completion
  • 100% online Start instantly and learn at your own schedule.
  • Course 4 of 7 in the Cybersecurity Operations Fundamentals Specialization
  • Approx. 15 hours to complete
  • English Subtitles: English
Read more
Details Icon

Data Security
 at 
Coursera 
Course details

More about this course
  • If you are an associate-level cybersecurity analyst who is working in security operation centers, this course will help you explore data type categories in context to network security analytics.
  • By the end of the course, you will be able to:
  • • Explain the data that is available to the network security analysis •Describe the various types of data used in monitoring network security
  • • Describe the deployment and use of SIEMs to collect, sort, process, prioritize, store, and report alarms
  • • Describe the functions of SOAR platforms and features of Cisco SecureX
  • •Describe the Security Onion Open Source security monitoring tool
  • • Explain how packet capture data is stored in the PCAP format and the storage requirements for full packet capture.
  • • Describe packet capture usage and benefits for investigating security incidents • Describe packet captures using tools such as Tcpdump
  • • Describe session data content and provide an example of session data
  • •Describe transaction data content and provide an example of transaction data z
  • • Describe alert data content and provide an example of alert data
  • •Describe other types of NSM data (extracted content, statistical data, and metadata)
  • •Explain the need to correlate NSM data and provide an example
  • •Describe the Information Security CIA triad
  • • Understand PII as it relates to information security
  • • Describe compliance regulations and their effects on an organization
  • • Describe intellectual property and the importance of protecting it
  • • Use various tool capabilities of the Security Onion Linux distribution
  • To be successful in this course, you should have the following background:
  • 1. Skills and knowledge equivalent to those learned in Implementing and Administering Cisco Solutions (CCNA) v1.0 course
  • 2. Familiarity with Ethernet and TCP/IP networking
  • 3. Working knowledge of the Windows and Linux operating systems 4. Familiarity with basics of networking security concepts.
Read more

Data Security
 at 
Coursera 
Curriculum

Exploring Data Type Categories

Introduction to Exploring Data Type Categories

Network Security Monitoring Data Types

Security Information and Event Management Systems

Security Onion Overview

Security Onion

Full Packet Capture

Packet Captures

Packet Capture Using Tcpdump

Session Data

Transaction Data

Alert Data

Other Data Types

Correlating NSM Data

Information Security Overview

Personally Identifiable Information

Regulatory Compliance

Wrap-Up

Introduction to Exploring Data Type Categories

Session Data

Full Packet Capture

Transaction Data

Extracted Content

Statistical Data

Alert Data

Syslog

Indicator of Compromise

Network Time Protocol

Network Security Monitoring Data Types

Security Information and Event Management Systems

Security Orchestration, Automation, and Response

SOAR Capabilities

Cisco SecureX Platform

Security Onion Overview

Deployment Options

Security Onion Network Security Monitoring Tools

Full Packet Capture

Packet Captures

Packet Capture Using Tcpdump

Packet Capture Using Tcpdump

Packet Capture Using Tcpdump (Cont.)

Tcpdump Command Options

BPF Syntax Examples

Session Data

Transaction Data

Alert Data

Other Data Types

Extracted Content

Statistical Data

Metadata

Correlating NSM Data

Information Security Confidentiality, Integrity, and Availability

Personally Identifiable Information

Regulatory Compliance

Intellectual Property

Information Assets

Threat Spectrum

A Pervasive Security Culture

Wrap-Up

Network Security Monitoring Data Types Practice Quiz

Security Information and Event Management Systems Practice Quiz

Security Orchestration, Automation, and Response Practice Quiz

Security Onion Overview Practice Quiz

Full Packet Capture Practice Quiz

Packet Capture Practice Quiz

Packet Capture Using Tcpdump Practice Quiz

Session Data Practice Quiz

Transaction Data Practice Quiz

Alert Data Practice Quiz

Other Data Types Practice Quiz

Correlating NSM Data Practice Quiz

Information Security Confidentiality, Integrity, and Availability Practice Quiz

Personally Identifiable Information Practice Quiz

Regulatory Compliance Practice Quiz

Intellectual Property Practice Quiz

Exploring Data Type Categories Course Exam

Understanding Basic Cryptography Concepts

Introduction to Understanding Basic Cryptography Concepts

Impact of Cryptography on Security Investigations

Cryptography Overview

Hash Algorithms

Encryption Overview

Cryptanalysis

Symmetric Encryption Algorithms

Asymmetric Encryption Algorithms

Diffie-Hellman Key Agreement

Use Case: SSH

Digital Signatures

PKI Overview

PKI Operations

Use Case: SSL/TLS

Cipher Suite

Key Management

NSA Suite B

Wrap-Up

Introduction to Understanding Basic Cryptography Concepts

Overview of Cryptography

Impact of Cryptography on Security Investigations

Impact of Cryptography on Security Investigations

Digital Certificates

Cryptography Overview

Cryptography History

Ciphers for Everyone

Hash Algorithms

Cryptographic Authentication Using Hash Technology

Cryptographic Authentication in Action

Comparing Hashing Algorithms

Encryption Overview

Encryption Algorithm Features

Cryptanalysis

Symmetric Encryption Algorithms

Symmetric Encryption Key Lengths

Comparing Symmetric Encryption Algorithms

Asymmetric Encryption Algorithms

Diffie-Hellman Key Agreement

Use Case: SSH

Digital Signatures

RSA Digital Signatures

Practical Example: Digitally Signed Cisco Software

PKI Overview

Trusted Third-Party Example

PKI Terminology and Components

Public-Key Cryptography Standards

X.509

PKI Operations

Certificate Enrollment

Authentication Using Certificates

Certificate Revocation

Certificate Revocation Check Methods

Use Case: SSL/TLS

SSL/TLS Certificate Example

Web Browser Security Warnings

Cipher Suite

TLS Cipher Suite Examples

Key Management

Key Management Components

Key Spaces

Key Length Issues

NSA Suite B

Wrap-Up

Impact of Cryptography on Security Investigations Practice Quiz

Cryptography Overview Practice Quiz

Hash Algorithms Practice Quiz

Encryption Overview Practice Quiz

Cryptanalysis Practice Quiz

Symmetric Encryption Algorithms Practice Quiz

Asymmetric Encryption Algorithms Practice Quiz

Diffie-Hellman Key Agreement Practice Quiz

Use Case: SSH Practice Quiz

Digital Signatures Practice Quiz

PKI Overview Practice Quiz

PKI Operations Practice Quiz

Use Case: SSL/TLS Practice Quiz

Cipher Suite Practice Quiz

Key Management Practice Quiz

NSA Suite B Practice Quiz

Understanding Basic Cryptography Concepts Course Exam

Data Security
 at 
Coursera 
Admission Process

    Important Dates

    May 25, 2024
    Course Commencement Date

    Other courses offered by Coursera

    – / –
    3 months
    Beginner
    – / –
    20 hours
    Beginner
    – / –
    2 months
    Beginner
    – / –
    3 months
    Beginner
    View Other 6715 CoursesRight Arrow Icon
    qna

    Data Security
     at 
    Coursera 

    Student Forum

    chatAnything you would want to ask experts?
    Write here...