The Foundations of Cybersecurity
- Offered byCoursera
The Foundations of Cybersecurity at Coursera Overview
Duration | 9 hours |
Start from | Start Now |
Total fee | Free |
Mode of learning | Online |
Difficulty level | Beginner |
Official Website | Explore Free Course |
Credential | Certificate |
The Foundations of Cybersecurity at Coursera Highlights
- Shareable Certificate Earn a Certificate upon completion
- 100% online Start instantly and learn at your own schedule.
- Course 1 of 5 in the Managing Cybersecurity Specialization
- Flexible deadlines Reset deadlines in accordance to your schedule.
- Beginner Level
- Approx. 9 hours to complete
- English Subtitles: Arabic, French, Portuguese (European), Italian, Vietnamese, German, Russian, English, Spanish
The Foundations of Cybersecurity at Coursera Course details
- In order to manage the cybersecurity function business, you must first understand its language and its environment. This course covers the foundations of cybersecurity, including threats and vulnerabilities as well as the tools, technologies, and strategies used to manage it.
- After completing this course, a learner will be able to:
- ? Define key concepts and terminology in Cybersecurity
- ? Identify threats to cybersecurity
- ? Identify strategies to identify and remediate vulnerabilities in information assets
- ? Identify the systemic components (including personnel) necessary for an effective cybersecurity program
The Foundations of Cybersecurity at Coursera Curriculum
Welcome to The Foundations of Cybersecurity (Course 1)
Welcome
Introduction to Cybersecurity (Module 1.1)
The Definition of Cybersecurity
The Definition of Cybersecurity (Lecture 1.1.1)
Key Concepts in Cybersecurity - Part 1 (Lecture 1.1.2)
Key Concepts in Cybersecurity - Part 2 (Lecture 1.1.3)
Wrap-up for Introduction to Cybersecurity
The CIA Triad
The Definition of Cybersecurity (Quiz 1.1.1)
Key Concepts in Cybersecurity - Part 1 (Quiz 1.1.2)
Key Concepts in Cybersecurity - Part 2 (Quiz 1.1.3)
Quiz for Introduction to Cybersecurity Module
Threats to Cybersecurity (Module 1.2)
Threats to Cybersecurity
Compromises to IP, Deviations in QoS, & Espionage or Trespass (Lecture 1.2.1)
Forces of Nature, Human Error or Failure & Information Extortion (Lecture 1.2.2)
Sabotage or Vandalism, Software Attacks & Technical Hardware Failures (Lesson 1.2.3)
Technical Hardware Failure, Technical Software Failure, Technological Obsolescence, and Theft (Lesson 1.2.4)
Threats to Cybersecurity Wrap-up
Threats to Cybersecurity
Compromises to IP, Deviations in QoS, & Espionage or Trespass (Quiz 1.2.1)
Forces of Nature, Human Error or Failure & Information Extortion (Quiz 1.2.2)
Sabotage or vandalism, Software attacks & Technical hardware failures (Quiz 1.2.3)
Technical Hardware Failure, Technical Software Failure, Technological Obsolescence, and Theft (Quiz1.2.4)
Threats to Cybersecurity - Module Quiz
Security Technologies (Module 1.3)
Security Technologies
Access Control (Lecture 1.3.1)
Firewalls (Lecture 1.3.2)
Intrusion Detection andPrevention Systems (Lecture 1.3.3)
Virtual Private Networks (Lecture 1.3.4)
Wrap-up for Security Technologies
Protection Mechanisms
Access Control (Quiz 1.3.1)
Firewalls (Quiz 1.3.2)
Intrusion Detection and Prevention Systems (Quiz 1.3.3)
Virtual Private Networks (Quiz 1.3.4)
Security Technologies Module
Managing Vulnerabilities in Information Assets (Module 1.4)
Vulnerabilities in Information Assets
Understanding Vulnerabilities and Vulnerability Assessment (Lesson 1.4.1)
Vulnerability Assessment: Tools and Techniques (Lesson 1.4.2)
Vulnerability Remediation Strategies (Lesson 1.4.3)
Configuration and Change Management in Vulnerability Assessment (Lesson 1.4.4)
Wrap-up for Managing Vulnerabilities
Scanning and Analysis Tools
Understanding Vulnerabilities and Vulnerability Assessment (Quiz 1.4.1)
Vulnerability Assessment: Tools and Techniques (Quiz 1.4.2)
Vulnerability Remediation Strategies (Quiz 1.4.3)
Configuration and Change Management in Vulnerability Assessment (Quiz 1.4.4)
for module Managing Vulnerabilities in Information Assets
Understanding the Cybersecurity Program (Module 1.5)
Understanding the Cybersecurity Program
The Cybersecurity Personnel and the Security Department (Lecture 1.5.1)
Cybersecurity Programs: Policies, Guidelines and Standards (Lesson 1.5.2)
Cybersecurity Programs: Continuous Improvement Programs (Lesson 1.5.3)
The Cybersecurity Program, Explained
Policies, Standards, and Practices
The Cybersecurity Personnel and the Security Department (Quiz 1.5.1)
Cybersecurity Programs: Policies, Guidelines and Standards (Quiz 1.5.2)
Cybersecurity Programs: Continuous Improvement Programs (Quiz 1.5.3)
for module The Cybersecurity Program
Wrap-up for The Foundations of Cybersecurity
The Foundations of Cybersecurity
Completion Exam for Course The Foundations of Cybersecurity
The Foundations of Cybersecurity at Coursera Admission Process
Important Dates
Other courses offered by Coursera
The Foundations of Cybersecurity at Coursera Students Ratings & Reviews
- 3-42