Securing Software, Data and End Points
- Offered byCoursera
Securing Software, Data and End Points at Coursera Overview
Duration | 8 hours |
Start from | Start Now |
Total fee | Free |
Mode of learning | Online |
Difficulty level | Beginner |
Official Website | Explore Free Course |
Credential | Certificate |
Securing Software, Data and End Points at Coursera Highlights
- Earn a Certificate upon completion
Securing Software, Data and End Points at Coursera Course details
- In this course, we'll build on that foundation by looking more closely at how the data can be the target of an attack and part of exploiting other vulnerabilities in the system
- We'll explore what security professionals, as non-programmers, can do to reduce the risk of such malformed input attacks
- In course two, we also discussed the non-human user concept as a general way to view management and security of devices and software entities to protect those entities from threats to their integrity and to protect the overall system and individual assets from unauthorized behavior by those non-human users
- In this chapter, we'll build on those concepts, as we dive into Endpoint Security Issues and Approaches
Securing Software, Data and End Points at Coursera Curriculum
Module 1: Securing Software
Welcome
Shadow IT
Knowledge Check: Open Source versus Proprietary Software
Knowledge Check: Securing Software
Data Security: The Threat Perspective
Constrained User Interface (CUI)
Activity 1: Data Vulnerability Hunting
Knowledge Check: Securing Data
Module 3: Identify and Analyze Malicious Code and Activity
Activity 2: Key Concepts
Knowledge Check: Vulnerable Web Applications
Knowledge Check: Malicious Code Countermeasures
Knowledge Check: Malicious Code and Activity
Remote Working (Telework)
SCADA Attacks
Modbus, DNC and Logic Controllers
Activity 3: SolarWinds and SNMP
Applied Scenario 1: Implement and Operate Endpoint Security
Knowledge Check: Implement and Operate Endpoint Security
Module 5: Operate and Secure Virtual Environments
Module 5 Overview
Risks to VMs and Virtualized Environments
Host Security Considerations
Activity 4: Host Security Review
Knowledge Check: Operate and Secure Virtual Environments
Terms and Definitions
Chapter 4 Quiz: Securing Software, Data and Endpoints