Coursera
Coursera Logo

Securing Software, Data and End Points 

  • Offered byCoursera

Securing Software, Data and End Points
 at 
Coursera 
Overview

Duration

8 hours

Start from

Start Now

Total fee

Free

Mode of learning

Online

Difficulty level

Beginner

Official Website

Explore Free Course External Link Icon

Credential

Certificate

Securing Software, Data and End Points
 at 
Coursera 
Highlights

  • Earn a Certificate upon completion
Details Icon

Securing Software, Data and End Points
 at 
Coursera 
Course details

More about this course
  • In this course, we'll build on that foundation by looking more closely at how the data can be the target of an attack and part of exploiting other vulnerabilities in the system
  • We'll explore what security professionals, as non-programmers, can do to reduce the risk of such malformed input attacks
  • In course two, we also discussed the non-human user concept as a general way to view management and security of devices and software entities to protect those entities from threats to their integrity and to protect the overall system and individual assets from unauthorized behavior by those non-human users
  • In this chapter, we'll build on those concepts, as we dive into Endpoint Security Issues and Approaches

Securing Software, Data and End Points
 at 
Coursera 
Curriculum

Module 1: Securing Software

Welcome

Shadow IT

Knowledge Check: Open Source versus Proprietary Software

Knowledge Check: Securing Software

Data Security: The Threat Perspective

Constrained User Interface (CUI)

Activity 1: Data Vulnerability Hunting

Knowledge Check: Securing Data

Module 3: Identify and Analyze Malicious Code and Activity

Activity 2: Key Concepts

Knowledge Check: Vulnerable Web Applications

Knowledge Check: Malicious Code Countermeasures

Knowledge Check: Malicious Code and Activity

Remote Working (Telework)

SCADA Attacks

Modbus, DNC and Logic Controllers

Activity 3: SolarWinds and SNMP

Applied Scenario 1: Implement and Operate Endpoint Security

Knowledge Check: Implement and Operate Endpoint Security

Module 5: Operate and Secure Virtual Environments

Module 5 Overview

Risks to VMs and Virtualized Environments

Host Security Considerations

Activity 4: Host Security Review

Knowledge Check: Operate and Secure Virtual Environments

Terms and Definitions

Chapter 4 Quiz: Securing Software, Data and Endpoints

Securing Software, Data and End Points
 at 
Coursera 
Admission Process

    Important Dates

    May 25, 2024
    Course Commencement Date

    Other courses offered by Coursera

    – / –
    3 months
    Beginner
    – / –
    20 hours
    Beginner
    – / –
    2 months
    Beginner
    – / –
    3 months
    Beginner
    View Other 6715 CoursesRight Arrow Icon
    qna

    Securing Software, Data and End Points
     at 
    Coursera 

    Student Forum

    chatAnything you would want to ask experts?
    Write here...