Systems and Application Security
- Offered byCoursera
Systems and Application Security at Coursera Overview
Duration | 17 hours |
Start from | Start Now |
Total fee | Free |
Mode of learning | Online |
Difficulty level | Beginner |
Official Website | Explore Free Course |
Credential | Certificate |
Systems and Application Security at Coursera Highlights
- Shareable Certificate Earn a Certificate upon completion
- 100% online Start instantly and learn at your own schedule.
- Course 6 of 6 in the (ISC)² Systems Security Certified Practitioner (SSCP)
- Flexible deadlines Reset deadlines in accordance to your schedule.
- Beginner Level
- Approx. 17 hours to complete
- English Subtitles: English
Systems and Application Security at Coursera Course details
- Welcome to Systems and Application Security Course!
- In the Systems and Application Security Course, you will gain an understanding of computer code that can be described as harmful or malicious. Both technical and non-technical attacks will be discussed. You will learn how an organization can protect itself from these attacks. You will learn concepts in endpoint device security, cloud infrastructure security, securing big data systems, and securing virtual environments.
- Objectives
- 1. Identify malicious code activity
- 2. Describe malicious code and the various countermeasures
- 3. Describe the processes for operating endpoint device security
- 4. Define mobile device management processes
- 5. Describe the process for configuring cloud security
- 6. Explain the process for securing big data systems
- 7. Summarize the process for securing virtual environments
Systems and Application Security at Coursera Curriculum
Identify and Analyze Malicious Code and Activity
Systems and Application Security
Malicious Code and Activity: Key Concepts
Malicious Code and Activity: Malicious Code Countermeasures
Malicious Code and Activity: Software Exploitation Methods
Malicious Code and Activity: Software Exploitation Methods
Malicious Code and Activity: Code Signing
Malicious Code and Activity: Social Engineering
Malicious Code and Activity: Security Awareness Training
Malicious Code and Activity: Long File Extensions
Malicious Code and Activity: E-mail
Malicious Code and Activity: Countermeasures
Malicious Code and Activity: Examples of Spoofing
Malicious Code and Activity: Techniques
Malicious Code and Activity: Botnet-Led Exploits
Malicious Code and Activity: Malicious Web Activity
Malicious Code and Activity: Zero-Day Exploits
Malicious Code and Activity: Infected Factory Builds and Media
Malicious Code and Activity: Inspection of Processes
Systems and Application Security
Malicious Code and Activity: Key Concepts
Malicious Code and Activity: Malicious Code Countermeasures
Malicious Code and Activity: Software Exploitation Methods
Malicious Code and Activity: Software Exploitation Methods
Malicious Code and Activity: Code Signing
Malicious Code and Activity: Social Engineering
Malicious Code and Activity: Security Awareness Training
Malicious Code and Activity: Long File Extensions
Malicious Code and Activity: E-mail
Malicious Code and Activity: Countermeasures
Malicious Code and Activity: Examples of Spoofing
Malicious Code and Activity: Techniques
Malicious Code and Activity: Botnet-Led Exploits
Malicious Code and Activity: Malicious Web Activity
Malicious Code and Activity: Zero-Day Exploits
Malicious Code and Activity: Infected Factory Builds and Media
Malicious Code and Activity: Inspection of Processes
Quiz 1
Implement and Operate Endpoint Device Security
Endpoint Device Security: HIDS
Endpoint Device Security: Trusted Platform Module (TPM)
Endpoint Device Security: BYOD Policy Considerations
Endpoint Device Security: HIDS
Endpoint Device Security: Trusted Platform Module (TPM)
Endpoint Device Security: BYOD Policy Considerations
Quiz 2
Operate and Configure Cloud Security
Cloud Security: Five Essential Characteristics of Clouds
Cloud Security: Hybrid
Cloud Security: Virtualization
Cloud Security: Hypervisor
Cloud Security: Country-Specific Legal Considerations
Cloud Security: P&DP Laws
Cloud Security:Application of Defined Controls for Personally Identifiable Information (PII)
Cloud Security: Data Dispersion
Cloud Security: Threat to Storage Types
Cloud Security: Technologies to Address Threats
Cloud Security: DLP Architecture
Cloud Security: Review Activity
Cloud Security: Key Storage in the Cloud
Cloud Security: Common Approaches for Data Masking
Cloud Security: Data Retention Policies
Cloud Security: Disposal Options
Cloud Security: Five Essential Characteristics of Clouds
Cloud Security: Hybrid
Cloud Security: Virtualization
Cloud Security: Hypervisor
Cloud Security: Country-Specific Legal Considerations
Cloud Security: P&DP Laws
Cloud Security: Application of Defined Controls for Personally Identifiable Information (PII)
Cloud Security: Data Dispersion
Cloud Security: Threat to Storage Types
Cloud Security: Technologies to Address Threats
Cloud Security: DLP Architecture
Cloud Security: Review Activity
Cloud Security: Key Storage in the Cloud
Cloud Security: Common Approaches for Data Masking
Cloud Security: Data Retention Policies
Cloud Security: Disposal Options
Quiz 3
Secure Big Data Systems & Operate and Secure Virtual Environments
Secure Big data Systems: Big Data
Secure Big Data Systems: Interpreting Big Data
Secure Big data Systems: Key Challenges
Operate and Secure Virtual Environments: SDN
Operate and Secure Virtual Environments: Virtual Appliances
Operate and Secure Virtual Environments: DRS
Operate and Secure Virtual Environments: Common Attacks
Operate and Secure Virtual Environments: Network Security
Operate and Secure Virtual Environments: Virtual Machine Security
Secure Big Data Systems: Big Data
Secure Big Data Systems: Interpreting Big Data
Secure Big data Systems: Key Challenges
Operate and Secure Virtual Environments: SDN
Operate and Secure Virtual Environments: Virtual Appliances
Operate and Secure Virtual Environments: DRS
Operate and Secure Virtual Environments: Common Attacks
Operate and Secure Virtual Environments: Network Security
Operate and Secure Virtual Environments: Virtual Machine Security
Quiz 4
Case Study
End-of-Course Assessment
Final Quiz