Quizzes and projects for Introduction to Cyber Security were designed to exercise the learner’s understanding and retention of the covered topics. Emphasis is on foundational issues, rather than just memorizing facts. The goal is to help learners develop the habit of properly assessing and improving cyber risk posture in real computing, networking, and software systems. Authentic scenarios are included based on practical enterprise and infrastructure deployments to enhance the learning experience.
Introduction to Cyber Security Specialization
Cyber Security. An introduction to modern information and system protection technology and methods.
About This Specialization
Introduction to Cyber Security was designed to help learners develop a deeper understanding of modern information and system protection technology and methods. The learning outcome is simple: We hope learners will develop a lifelong passion and appreciation for cyber security, which we are certain will help in future endeavors. Students, developers, managers, engineers, and even private citizens will benefit from this learning experience. Special customized interviews with industry partners were included to help connect the cyber security concepts to live business experiences.
Follow the suggested order or choose your own.
Designed to help you practice and apply the skills you learn.
Highlight your new skills on your resume or LinkedIn.
- Beginner Specialization.
- No prior experience required.
Introduction to Cyber Attacks
About the CourseThis course provides learners with a baseline understanding of common cyber security threats, vulnerabilities, and risks. An overview of how basic cyber attacks are constructed and applied to real systems is also included. Examples include sim
Cyber Attack Countermeasures
About the CourseThis course introduces the basics of cyber defense starting with foundational models such as Bell-LaPadula and information flow frameworks. These underlying policy enforcements mechanisms help introduce basic functional protections, start
Real-Time Cyber Threat Detection and Mitigation
About the CourseThis course introduces real-time cyber security techniques and methods in the context of the TCP/IP protocol suites. Explanation of some basic TCP/IP security hacks is used to introduce the need for network security solutions such as stateless and
Enterprise and Infrastructure Security
About the CourseThis course introduces a series of advanced and current topics in cyber security, many of which are especially relevant in modern enterprise and infrastructure settings. The basics of enterprise compliance frameworks are provided with introduction to
Dr. Edward G. Amoroso
Research Professor, NYU and CEO, TAG Cyber LLC
More questions? Visit the Learner Help Center.