About this Course
4.6
101 ratings
21 reviews
Specialization
100% online

100% online

Start instantly and learn at your own schedule.
Flexible deadlines

Flexible deadlines

Reset deadlines in accordance to your schedule.
Intermediate Level

Intermediate Level

Hours to complete

Approx. 9 hours to complete

Suggested: 11 hours/week...
Available languages

English

Subtitles: English
Specialization
100% online

100% online

Start instantly and learn at your own schedule.
Flexible deadlines

Flexible deadlines

Reset deadlines in accordance to your schedule.
Intermediate Level

Intermediate Level

Hours to complete

Approx. 9 hours to complete

Suggested: 11 hours/week...
Available languages

English

Subtitles: English

Syllabus - What you will learn from this course

Week
1
Hours to complete
4 hours to complete

Security Awareness, Compliance, Assessments, and Risk

This module includes an introduction to many practical aspects of modern enterprise security including awareness, compliance, assessments, and risk management....
Reading
12 videos (Total 66 min), 5 readings, 1 quiz
Video12 videos
Assignments and Reading2m
Social Engineering5m
Phishing7m
Security Awareness4m
Using Video for Security Awareness1m
Security Assessment and Audit4m
What is GRC?9m
NIST Framework Overview4m
PCI-DSS Framework Overview5m
Challenges of Compliance versus Security5m
Welcome Roger Thornton (Part 1): CTO, AlienVault12m
Reading5 readings
Video: Welcome to Ataata2m
Required: “Framework for Improving Critical Infrastructure Cybersecurity,” Version 1.0, NIST, Feb 12, 2014.m
Video: “Addressing the Challenges of Complying with the Payment Card Industry Data Security Standard,” HALOCK Security Labs – Introduction to PCI Compliance11m
Video: “Closing Keynote – The Past, Present, and Future of Integrated GRC,” French Caldwell, MetricStream33m
Suggested: Introduction to Cyber Security, Edward Amoroso and Matthew Amoroso, eBook available online (Chapters 25 - 26)m
Quiz1 practice exercise
Module 1 Quiz20m
Week
2
Hours to complete
3 hours to complete

Hybrid Cloud Security

This module provides students with an introduction to the cyber security implications of the enterprise shifting to a hybrid cloud computing model....
Reading
10 videos (Total 56 min), 2 readings, 1 quiz
Video10 videos
Enterprise Shift to Hybrid Cloud6m
Workload Micro-Segmentation6m
Defense in Depth through Micro-Segmentation4m
Cloud Access Security Brokers4m
Advanced Hybrid Cloud Security Architecture (Part 1)6m
Advanced Hybrid Cloud Security Architecture (Part 2)4m
Advanced Hybrid Cloud Security Architecture (Part 3)3m
Security of Isolated Servers (Outside Perimeter)4m
Welcome John Popolizio: Founder, Riverdale Group13m
Reading2 readings
Required: “Practical Methods for Securing the Cloud,” IEEE, Ed Amoroso, 201420m
Suggested: Introduction to Cyber Security, Edward Amoroso and Matthew Amoroso, eBook available online (Chapters 27 - 28)m
Quiz1 practice exercise
Module 2 Quiz20m
Week
3
Hours to complete
4 hours to complete

Blockchain, Anonymity, and Critical Infrastructure Protection

This module introduces several advanced topics in cyber security ranging from blockchain usage, user anonymity, and critical infrastructure protection....
Reading
10 videos (Total 77 min), 4 readings, 1 quiz
Video10 videos
Hashing Algorithms7m
Blockchain - Part 16m
Blockchain - Part 29m
Cyber Attribution7m
Onion Routing and Tor8m
Chaum Binding Algorithm9m
Critical Infrastructure - Part 1 - Requirements7m
Critical Infrastructure - Part 2 - Protection Methods8m
Welcome Roger Thornton (Part 2): CTO, AlienVault9m
Reading4 readings
Required: “Bitcoin: A Peer-to-Peer Electronic Cash System,” S. Nakamoto20m
Required: “Common Threats and Vulnerabilities of Critical Infrastructures,” Robles, Choi, Cho, Kim, Park, and Lee, Dongseo University, Korea. International Journal of Control and Automation.15m
Video: “HDIAC Critical Infrastructure Protection Webinar,” Benjamin Ruddell, Arizona State University, 201542m
Suggested: Introduction to Cyber Security, Edward Amoroso and Matthew Amoroso, eBook available online (Chapters 29 - 30)m
Quiz1 practice exercise
Module 3 Quiz20m
Week
4
Hours to complete
3 hours to complete

Mobility Security and Deception

This module introduces several advanced topics in cyber security including mobility security and deception – and includes suggestions on career planning for future cyber professionals....
Reading
9 videos (Total 47 min), 5 readings, 2 quizzes
Video9 videos
Mobility Security9m
IMSI Catching5m
IoT Security6m
IoT Botnets3m
Using Deception and Honey Pots for Security5m
Welcome Elena Kvochko, Cyber Security Expert7m
Advice on Careers in Cyber Security5m
How to Continue a Learning Plan in Cyber Security2m
Reading5 readings
Required: “Anonymous Connections and Onion Routing,” Michael Reed, Paul Syverson, and David Goldschlag, onion-router.net.25m
Required: “Cyber Security Deception,” Mohammed Almeshekah and Eugene Spafford, Springer.com50m
Video: “Kevin Mahaffey – Lookout – Mobile Security,”22m
Project Description10m
Additional Self-Study10m
Quiz2 practice exercises
Module 4 Quiz20m
Multiple Choice Questions16m
4.6
21 ReviewsChevron Right
Career direction

75%

started a new career after completing these courses
Career Benefit

83%

got a tangible career benefit from this course

Top Reviews

By ZZSep 3rd 2018

Very Interesting . Course information was very well laid out & helped understand quickly without much difficulty. My proficiency level is Beginner in Cyber Security

By DRMay 30th 2018

This course provided a great overview, and helped me to understand basic information about many of the items involved in an overall cyber security program.

Instructor

Avatar

Dr. Edward G. Amoroso

Research Professor, NYU and CEO, TAG Cyber LLC
Computer Science

About New York University Tandon School of Engineering

Tandon offers comprehensive courses in engineering, applied science and technology. Each course is rooted in a tradition of invention and entrepreneurship....

About the Introduction to Cyber Security Specialization

Introduction to Cyber Security was designed to help learners develop a deeper understanding of modern information and system protection technology and methods. The learning outcome is simple: We hope learners will develop a lifelong passion and appreciation for cyber security, which we are certain will help in future endeavors. Students, developers, managers, engineers, and even private citizens will benefit from this learning experience. Special customized interviews with industry partners were included to help connect the cyber security concepts to live business experiences....
Introduction to Cyber Security

Frequently Asked Questions

  • Once you enroll for a Certificate, you’ll have access to all videos, quizzes, and programming assignments (if applicable). Peer review assignments can only be submitted and reviewed once your session has begun. If you choose to explore the course without purchasing, you may not be able to access certain assignments.

  • When you enroll in the course, you get access to all of the courses in the Specialization, and you earn a certificate when you complete the work. Your electronic Certificate will be added to your Accomplishments page - from there, you can print your Certificate or add it to your LinkedIn profile. If you only want to read and view the course content, you can audit the course for free.

More questions? Visit the Learner Help Center.