University of Colorado Boulder - Detecting and Mitigating Cyber Threats and Attacks
5.0 /5
- Offered byCoursera
Detecting and Mitigating Cyber Threats and Attacks at Coursera Overview
Detecting and Mitigating Cyber Threats and Attacks
at Coursera
Duration | 9 hours |
Mode of learning | Online |
Difficulty level | Beginner |
Credential | Certificate |
Detecting and Mitigating Cyber Threats and Attacks at Coursera Highlights
Detecting and Mitigating Cyber Threats and Attacks
at Coursera
- Learn from lecturer of University of Colorado
- 40% got a pay increase or promotion
- 57% got a tangible career benefit from this course
- Earn a certificate from University of Colorado
Read more
Detecting and Mitigating Cyber Threats and Attacks at Coursera Course details
Detecting and Mitigating Cyber Threats and Attacks
at Coursera
More about this course
- Computer attacks and data breaches are inevitable. It seems like every day a data breach occurs and the victims of the data breach suffer. Their information is stolen or posted online. The company's or businesses who had the breach go on, learn a little from the attack, and just give credit monitoring out as if nothing happened. What if you could help prevent a data breach in your organization? This is the third course in the Practical Computer Security specialization. This course looks at detection and mitigation of threats and attack vectors and discusses how to use tools and principles to protect information. By the end of the course you should be able to make suggestions on what type of detection and mitigation strategy is right for your systems or business given the known threats and attack vectors. You should be able to discuss what features you want in a firewall, or how cash registers or sensitive data systems should be secured. The project at the end of the course will allow you to apply what you have learned to argue what type of detection and mitigation strategies should have been employed by companies and businesses that have suffered a data breach
Detecting and Mitigating Cyber Threats and Attacks at Coursera Curriculum
Detecting and Mitigating Cyber Threats and Attacks
at Coursera
Introduction and Firewalls
Introduction
About the Instructor
Firewall basics
Advanced firewalls
Types of firewall configurations
Intrusion Detection and Prevention
Detection Methods
Intrusion Detection Systems
Intrusion Prevention Systems
Detection and Prevention tools
Anti-Virus/Anti-Malware
Snort
HIDs and HIPs
Splunk
Attacks are Inevitable - Case Study
Attacks are inevitable - Prepare
Before the Attack
During the Attack
After the Attack
Understanding detection and mitigation
How data breaches are exposed
Other courses offered by Coursera
– / –
3 months
Beginner
View Other 6715 Courses
Detecting and Mitigating Cyber Threats and Attacks at Coursera Students Ratings & Reviews
Detecting and Mitigating Cyber Threats and Attacks
at Coursera
5/5
1 Rating- 4-51
A
Aishwarya Thiyagarajan
Detecting and Mitigating Cyber Threats and Attacks
Offered by Coursera
5
Other: I really enjoyed the learning process. I was able to learn deeper about those cyber attacks and its threats
Reviewed on 16 May 2021Read More
View 1 Review
Detecting and Mitigating Cyber Threats and Attacks
at Coursera
Student Forum
Anything you would want to ask experts?
Write here...