Enterprise and Infrastructure Security
- Offered byCoursera
Enterprise and Infrastructure Security at Coursera Overview
Duration | 9 hours |
Total fee | ₹3,516 |
Mode of learning | Online |
Difficulty level | Intermediate |
Credential | Certificate |
Enterprise and Infrastructure Security at Coursera Highlights
- Learn from research professor of NYU and CEO, TAG Cyber LLC
- Earn a certificate upon successful completion from NYU
- 50% got a tangible career benefit from this course
- 20% got a pay increase or promotion
Enterprise and Infrastructure Security at Coursera Course details
- This course introduces a series of advanced and current topics in cyber security, many of which are especially relevant in modern enterprise and infrastructure settings. The basics of enterprise compliance frameworks are provided with introduction to NIST and PCI. Hybrid cloud architectures are shown to provide an opportunity to fix many of the security weaknesses in modern perimeter local area networks.
- Emerging security issues in blockchain, blinding algorithms, Internet of Things (IoT), and critical infrastructure protection are also described for learners in the context of cyber risk. Mobile security and cloud security hyper-resilience approaches are also introduced. The course completes with some practical advice for learners on how to plan careers in cyber security.
Enterprise and Infrastructure Security at Coursera Curriculum
Week 1: Security Awareness, Compliance, Assessments, and Risk
Introduction: What You Will Learn from This Course on Cyber Security Assignments and Reading
Social Engineering
Phishing
Security Awareness
Using Video for Security Awareness
Security Assessment and Audit
What is GRC?
NIST Framework Overview
PCI-DSS Framework Overview
Challenges of Compliance versus Security
Welcome Roger Thornton (Part 1): CTO, AlienVault
Week 2: Hybrid Cloud Security
Assignments and Reading
Enterprise Shift to Hybrid Cloud
Workload Micro-Segmentation
Defense in Depth through Micro-Segmentation
Cloud Access Security Brokers
Advanced Hybrid Cloud Security Architecture (Part 1)
Advanced Hybrid Cloud Security Architecture (Part 2)
Advanced Hybrid Cloud
Security Architecture (Part 3)
Security of Isolated Servers (Outside Perimeter)
Welcome John Popolizio: Founder, Riverdale Group
Week 3: Blockchain, Anonymity, and Critical Infrastructure Protection
Assignments and Reading
Hashing Algorithms
Blockchain - Part 1
Blockchain - Part 2
Cyber Attribution
Onion Routing and Tor
Chaum Binding Algorithm
Critical Infrastructure - Part 1 - Requirements
Critical Infrastructure - Part 2 - Protection Methods
Welcome Roger Thornton (Part 2): CTO, AlienVault
Week 4: Mobility Security and Deception
Assignments and Reading
Mobility Security
IMSI Catching
IoT Security
IoT Botnets
Using Deception and Honey Pots for Security
Welcome Elena Kvochko, Cyber Security Expert
Advice on Careers in Cyber Security
How to Continue a Learning Plan in Cyber Security