Coursera
Coursera Logo

NYU - Real-Time Cyber Threat Detection and Mitigation 

  • Offered byCoursera

Real-Time Cyber Threat Detection and Mitigation
 at 
Coursera 
Overview

Duration

15 hours

Start from

Start Now

Total fee

Free

Mode of learning

Online

Difficulty level

Intermediate

Official Website

Explore Free Course External Link Icon

Credential

Certificate

Real-Time Cyber Threat Detection and Mitigation
 at 
Coursera 
Highlights

  • Shareable Certificate Earn a Certificate upon completion
  • 100% online Start instantly and learn at your own schedule.
  • Course 3 of 4 in the Introduction to Cyber Security Specialization
  • Flexible deadlines Reset deadlines in accordance to your schedule.
  • Intermediate Level
  • Approx. 15 hours to complete
  • English Subtitles: English
Read more
Details Icon

Real-Time Cyber Threat Detection and Mitigation
 at 
Coursera 
Course details

More about this course
  • This course introduces real-time cyber security techniques and methods in the context of the TCP/IP protocol suites. Explanation of some basic TCP/IP security hacks is used to introduce the need for network security solutions such as stateless and stateful firewalls. Learners will be introduced to the techniques used to design and configure firewall solutions such as packet filters and proxies to protect enterprise assets.
  • Perimeter solutions such as firewalls and intrusion prevention systems are shown to have significant drawbacks in common enterprise environments. The result of such weakness is shown to often exist as advanced persistent threats (APTs) from nation-state actors. Such attacks, as well as DDOS and third-party attacks, are shown to have potential solutions for modern enterprise.
Read more

Real-Time Cyber Threat Detection and Mitigation
 at 
Coursera 
Curriculum

Basic Network Security

Introduction: What You Will Learn from This Course on Cyber Security

Assignments and Reading

Security Through Obscurity

TCP/IP Evolution and Security

TCP/IP Overview

IP Spoofing

TCP Sequence Number Attack

Packet Flooding

Packet Sniffing

SYN Packets for Access Control

Definition of a Firewall

Firewall: Stateful versus Stateless

Interview: John Viega

Required: ?Network Firewalls,? Steve Bellovin and Bill Cheswick

Required: ?Introduction to TCP/IP Network Attacks,? Guang Yang

Video: ?Hacking DNS,? Eli the Computer Guy

Suggested: Introduction to Cyber Security, Edward Amoroso and Matthew Amoroso, (Ch. 17 - 18)

Suggested: TCP/IP Illustrated Volume 1 (2nd Edition), Kevin Fall and W. Richard Stevens, (Ch. 17 ? 18)

Module 1 Quiz

More Advanced Network Security Technologies

Assignments and Reading

Packet Filtering

Sample Packet Filtering and Reference Architecture

Default Firewall Block

Firewall Rules to Allow Outbound Web Browsing

Firewall Rules to Allow Telnet and Other TCP Services

Establishing Corporate Policy Rules

FTP Protocol

Firewall Rules for FTP

Application Proxy Filtering

Forward and Reverse Proxies

Interview: Roger Piqueras Jover

Required: ?Anomaly-based Network Intrusion Detection: Techniques, Systems, and Challenges.?

Required: ?Intrusion Detection via Static Analysis,? Wagner and Dean

Video: ?How Does Intrusion Prevention Systems Work,? 2013 - SourceFire

Suggested: Introduction to Cyber Security, Edward Amoroso and Matthew Amoroso, (Chapters 19 - 20)

Module 2 Quiz

Network Security Architectures

Assignments and Readings

Firewall Architectures (Part 1)

Firewall Architectures (Part 2)

Management by Exception

System Auditing

Basics of Intrusion Detection

Signature Versus Behavioral Detection

IDS Versus IPS

Design of SIEM

Design of a SOC

Interview: Dino Dai Zovi

Required: ?An Evening with Berferd,? Bill Cheswick

Required: ?IDES Model,? Dorothy Denning

Video: ?DEFCAMP 2015 ? Building a Security Operations Center,?

Suggested: Introduction to Cyber Security, Edward Amoroso and Matthew Amoroso, (Ch. 21 - 22)

Module 3 Quiz

Enterprise Network Security

Assignments and Reading

Practical Limitations of Perimeter

APT Schema Through Perimeter Holes

Third Party Security

Target APT Attack

Large Government Agency Attack

Layer 3 DDOS Protection

Layer 7 Application Level DDOS Risk

Large Financial Website DDOS Attacks

Network Security Industry Overview

Interview: Ray Cheng - Pt. 1

Interview: Ray Cheng - Pt. 2

Required: ?From the Enterprise Perimeter to Mobility Enabled Cloud,? Ed Amoroso, IEEE

Required: ?A Study of Advanced Persistent Threats,? Chen, Desmet, and Huygens

?Implementing Zero Trust,? Ed Amoroso, 2018

Suggested: Introduction to Cyber Security, Edward Amoroso and Matthew Amoroso, (Ch. 23 - 24)

Quiz Directions

Module 4 Quiz

Select the Best Migration Choice:

Real-Time Cyber Threat Detection and Mitigation
 at 
Coursera 
Admission Process

    Important Dates

    May 25, 2024
    Course Commencement Date

    Other courses offered by Coursera

    – / –
    3 months
    Beginner
    – / –
    20 hours
    Beginner
    – / –
    2 months
    Beginner
    – / –
    3 months
    Beginner
    View Other 6715 CoursesRight Arrow Icon
    qna

    Real-Time Cyber Threat Detection and Mitigation
     at 
    Coursera 

    Student Forum

    chatAnything you would want to ask experts?
    Write here...