Coursera
Coursera Logo

Systems and Application Security 

  • Offered byCoursera

Systems and Application Security
 at 
Coursera 
Overview

Duration

17 hours

Start from

Start Now

Total fee

Free

Mode of learning

Online

Difficulty level

Beginner

Official Website

Explore Free Course External Link Icon

Credential

Certificate

Systems and Application Security
 at 
Coursera 
Highlights

  • Shareable Certificate Earn a Certificate upon completion
  • 100% online Start instantly and learn at your own schedule.
  • Course 6 of 6 in the (ISC)² Systems Security Certified Practitioner (SSCP)
  • Flexible deadlines Reset deadlines in accordance to your schedule.
  • Beginner Level
  • Approx. 17 hours to complete
  • English Subtitles: English
Read more
Details Icon

Systems and Application Security
 at 
Coursera 
Course details

More about this course
  • Welcome to Systems and Application Security Course!
  • In the Systems and Application Security Course, you will gain an understanding of computer code that can be described as harmful or malicious. Both technical and non-technical attacks will be discussed. You will learn how an organization can protect itself from these attacks. You will learn concepts in endpoint device security, cloud infrastructure security, securing big data systems, and securing virtual environments.
  • Objectives
  • 1. Identify malicious code activity
  • 2. Describe malicious code and the various countermeasures
  • 3. Describe the processes for operating endpoint device security
  • 4. Define mobile device management processes
  • 5. Describe the process for configuring cloud security
  • 6. Explain the process for securing big data systems
  • 7. Summarize the process for securing virtual environments
Read more

Systems and Application Security
 at 
Coursera 
Curriculum

Identify and Analyze Malicious Code and Activity

Systems and Application Security

Malicious Code and Activity: Key Concepts

Malicious Code and Activity: Malicious Code Countermeasures

Malicious Code and Activity: Software Exploitation Methods

Malicious Code and Activity: Software Exploitation Methods

Malicious Code and Activity: Code Signing

Malicious Code and Activity: Social Engineering

Malicious Code and Activity: Security Awareness Training

Malicious Code and Activity: Long File Extensions

Malicious Code and Activity: E-mail

Malicious Code and Activity: Countermeasures

Malicious Code and Activity: Examples of Spoofing

Malicious Code and Activity: Techniques

Malicious Code and Activity: Botnet-Led Exploits

Malicious Code and Activity: Malicious Web Activity

Malicious Code and Activity: Zero-Day Exploits

Malicious Code and Activity: Infected Factory Builds and Media

Malicious Code and Activity: Inspection of Processes

Systems and Application Security

Malicious Code and Activity: Key Concepts

Malicious Code and Activity: Malicious Code Countermeasures

Malicious Code and Activity: Software Exploitation Methods

Malicious Code and Activity: Software Exploitation Methods

Malicious Code and Activity: Code Signing

Malicious Code and Activity: Social Engineering

Malicious Code and Activity: Security Awareness Training

Malicious Code and Activity: Long File Extensions

Malicious Code and Activity: E-mail

Malicious Code and Activity: Countermeasures

Malicious Code and Activity: Examples of Spoofing

Malicious Code and Activity: Techniques

Malicious Code and Activity: Botnet-Led Exploits

Malicious Code and Activity: Malicious Web Activity

Malicious Code and Activity: Zero-Day Exploits

Malicious Code and Activity: Infected Factory Builds and Media

Malicious Code and Activity: Inspection of Processes

Quiz 1

Implement and Operate Endpoint Device Security

Endpoint Device Security: HIDS

Endpoint Device Security: Trusted Platform Module (TPM)

Endpoint Device Security: BYOD Policy Considerations

Endpoint Device Security: HIDS

Endpoint Device Security: Trusted Platform Module (TPM)

Endpoint Device Security: BYOD Policy Considerations

Quiz 2

Operate and Configure Cloud Security

Cloud Security: Five Essential Characteristics of Clouds

Cloud Security: Hybrid

Cloud Security: Virtualization

Cloud Security: Hypervisor

Cloud Security: Country-Specific Legal Considerations

Cloud Security: P&DP Laws

Cloud Security:Application of Defined Controls for Personally Identifiable Information (PII)

Cloud Security: Data Dispersion

Cloud Security: Threat to Storage Types

Cloud Security: Technologies to Address Threats

Cloud Security: DLP Architecture

Cloud Security: Review Activity

Cloud Security: Key Storage in the Cloud

Cloud Security: Common Approaches for Data Masking

Cloud Security: Data Retention Policies

Cloud Security: Disposal Options

Cloud Security: Five Essential Characteristics of Clouds

Cloud Security: Hybrid

Cloud Security: Virtualization

Cloud Security: Hypervisor

Cloud Security: Country-Specific Legal Considerations

Cloud Security: P&DP Laws

Cloud Security: Application of Defined Controls for Personally Identifiable Information (PII)

Cloud Security: Data Dispersion

Cloud Security: Threat to Storage Types

Cloud Security: Technologies to Address Threats

Cloud Security: DLP Architecture

Cloud Security: Review Activity

Cloud Security: Key Storage in the Cloud

Cloud Security: Common Approaches for Data Masking

Cloud Security: Data Retention Policies

Cloud Security: Disposal Options

Quiz 3

Secure Big Data Systems & Operate and Secure Virtual Environments

Secure Big data Systems: Big Data

Secure Big Data Systems: Interpreting Big Data

Secure Big data Systems: Key Challenges

Operate and Secure Virtual Environments: SDN

Operate and Secure Virtual Environments: Virtual Appliances

Operate and Secure Virtual Environments: DRS

Operate and Secure Virtual Environments: Common Attacks

Operate and Secure Virtual Environments: Network Security

Operate and Secure Virtual Environments: Virtual Machine Security

Secure Big Data Systems: Big Data

Secure Big Data Systems: Interpreting Big Data

Secure Big data Systems: Key Challenges

Operate and Secure Virtual Environments: SDN

Operate and Secure Virtual Environments: Virtual Appliances

Operate and Secure Virtual Environments: DRS

Operate and Secure Virtual Environments: Common Attacks

Operate and Secure Virtual Environments: Network Security

Operate and Secure Virtual Environments: Virtual Machine Security

Quiz 4

Case Study

End-of-Course Assessment

Final Quiz

Systems and Application Security
 at 
Coursera 
Admission Process

    Important Dates

    May 25, 2024
    Course Commencement Date

    Other courses offered by Coursera

    – / –
    3 months
    Beginner
    – / –
    20 hours
    Beginner
    – / –
    2 months
    Beginner
    – / –
    3 months
    Beginner
    View Other 6715 CoursesRight Arrow Icon
    qna

    Systems and Application Security
     at 
    Coursera 

    Student Forum

    chatAnything you would want to ask experts?
    Write here...