The Becoming a Cybersecurity Consultant course is the perfect choice for individuals planning to develop a career in cybersecurity, middle managers and executives. The course covers the following main learning objectives: Threats - Technology - Economics.
通过 Coursera Plus 提高技能,仅需 239 美元/年(原价 399 美元)。立即节省

Becoming a Cybersecurity Consultant



位教师:Marco Anisetti
授课教师
授课教师评分
我们要求所有学生根据授课教师的教学风格和质量提供对授课教师的反馈。










2,234 人已注册
包含在 中
了解更多
12 条评论
推荐体验
推荐体验
中级
3 years of practical experience in the subject of Cybersecurity (Including but not limited to Cybersecurity Consulting, Cybersecurity Management etc)
12 条评论
推荐体验
推荐体验
中级
3 years of practical experience in the subject of Cybersecurity (Including but not limited to Cybersecurity Consulting, Cybersecurity Management etc)
您将获得的技能
要了解的详细信息

添加到您的领英档案
20 项作业
了解顶级公司的员工如何掌握热门技能

该课程共有5个模块
涵盖的内容
1个视频
1个视频•总计12分钟
- The Cybersecurity Consultant Role profile•12分钟
The main focus of this module is to set up the stage for the rest of the course presenting key concepts that will be extended in the following modules. It will present an introduction to security and security properties as well as details on privacy and privacy preserving mechanisms. It will introduce the concept of accountability in the context of a Continuous Appropriate Dynamic Accountability strategy. Finally it will address elements linked to Risk Management. The module is organized in 3 lessons tackling the above aspects in a theoretical way leaving to other modules the deep dive into the relevant technical aspects. It is expected that at the end of the module, learners will acquire (a) knowledge on cyber threats and vulnerabilities, (b) knowledge on confidentiality, integrity, and availability principles (c) knowledge of cybersecurity and privacy principles used to manage risks related to the use, processing, storage, and transmission of information or data, (d) Skill in applying confidentiality, integrity, and availability principles, (e) Knowledge of risk/threat assessment, (f) Skill in performing impact/risk assessments.
涵盖的内容
10个视频3个作业
10个视频•总计84分钟
- Introduction and basic terminology•8分钟
- CIA triad & additional security properties•7分钟
- Security Attacks and Threats•6分钟
- Security Services and Security Mechanisms•6分钟
- Introduction to privacy preserving data management•4分钟
- Privacy-preserving DBMSs•6分钟
- Privacy-preserving data sharing•9分钟
- Anonymization techniques and related utility measures•10分钟
- Principles of Risk Management, Module 1•15分钟
- Principles of Risk Management, Module 2•12分钟
3个作业•总计15分钟
- CIA Triad and Security principles•6分钟
- Privacy principles•3分钟
- Principles of Risk Management•6分钟
The main focus of this module is to provide learners with an overview of offensive methods and techniques that are used to carry out security attacks targeting IT infrastructures and their services. The module is organized into 4 lessons tackling different aspects of cybersecurity offensive methods and techniques. The first lesson introduces attacker capabilities and attack stages, the second lesson discusses the current gaps and emerging security issues, the third lesson is dedicated to network attacks methods, while the fourth lesson will present novel technologies and the relative attack surface. It is expected that at the end of the module, learners will acquire (a) knowledge on cyber attack stages and attacker capabilities, (b) knowledge on emerging security issues, risks, and vulnerabilities, and (c) knowledge on computer networking concepts and protocols, and network security methodologies. This course will allow students to develop some basic but fundamental skills including including (i) skills to anticipate new security threats, (ii) skills to applying confidentiality, integrity, and availability principles, and (iii) skills to design countermeasures to identified security risks.
涵盖的内容
16个视频7个作业
16个视频•总计146分钟
- Introduction•7分钟
- Cyberattack lifecycle: Before the Attack•13分钟
- Cyberattack lifecycle: During the Attack•15分钟
- Cyberattack lifecycle: After the Attack•6分钟
- Introduction•8分钟
- Recent attacks•9分钟
- Key Findings•24分钟
- Overview of Network attacks, Module 1•11分钟
- Overview of Network attacks, Module 2•6分钟
- Introduction•4分钟
- Cloud Technology•9分钟
- Cloud Top Threats•5分钟
- SDN/NFV Technology•11分钟
- SDN/NFV Top Threats•5分钟
- IoT Technology•10分钟
- IoT Top Threats•3分钟
7个作业•总计31分钟
- Cybersecurity lifecycle: Before the attack•4分钟
- Cyberattack lifecycle: During and After the Attack•3分钟
- Emerging Security Issues and Evolving Attacks•10分钟
- Overview of Network attacks•5分钟
- Cloud Quiz•3分钟
- SDN/NFV Quiz•3分钟
- IoT Quiz•3分钟
The main focus of this module is to provide learners with an overview and provide details regarding defensive methods and techniques that are used to prevent, detect and mitigate security attacks targeting IT infrastructures and their services. The module is organized into five lessons tackling different aspects of cybersecurity defensive methods and techniques. The first lesson introduces the principles of security-by-design, the second lesson discusses vulnerability assessment and prevention methods, the third lesson is dedicated to network protection methods, the fourth lesson relates to application/OS protection techniques, while the fifth lesson addresses more specifically data protection.It is expected that at the end of the module, learners will acquire (a) knowledge on information technology (IT) security principles and methods, (b) knowledge on cyber defense and vulnerability assessment methods and their capabilities, and (c) knowledge on cybersecurity and privacy principles related to data protection. With this knowledge and course participation, several skills are developed, such as (i) skill in discerning the protection needs (i.e., security controls) of information systems and networks, (ii) skill in creating policies that reflect system security objectives, (iii) skill in designing countermeasures to identified security risks, and (iv) skill in evaluating the adequacy of security designs.
涵盖的内容
14个视频9个作业
14个视频•总计118分钟
- Introduction and Secure Development Lifecycle•11分钟
- Secure Design Good Practices•9分钟
- Secure Design Principles•13分钟
- Introduction•3分钟
- Black-Box Methods•12分钟
- Grey-Box Methods•11分钟
- White-Box Methods•6分钟
- Overview of Network Protection Methods•10分钟
- IDS and SIEM•15分钟
- OS/Application Protection Methods•13分钟
- Introduction•3分钟
- Basic Data Concepts•3分钟
- Economic Aspects•4分钟
- Defenses•5分钟
9个作业•总计46分钟
- Security by Design Quiz•5分钟
- Security Design Principles•5分钟
- Black-Box Methods•3分钟
- Grey-Box Methods•3分钟
- White-Box Methods•3分钟
- Overview of Network Protection Methods•6分钟
- IDS and SIEM quiz•7分钟
- Application/OS Protection Methods Quiz•9分钟
- Data Protection and Security•5分钟
The main focus of this module is to provide students with an overview and present details regarding risk management from an economic perspective so that once the module finishes, the student can assess the possible risks and their economic impact on a company. The lesson starts by explaining the importance of looking into cybersecurity from an economic perspective, then discussing the costs to consider when planning for cybersecurity measures. Also, it introduces theoretical and practical models for cybersecurity investments and decision-making while applying them to a concrete case using a cybersecurity economic tool called SECAdvisor. It is expected that at the end of the module, students will acquire (a) knowledge of integrating the organization’s goals and objectives into the architecture, and (b) knowledge of risk/threat assessment. With this knowledge and course participation, several skills are developed, such as (i) skill in evaluating the adequacy of security designs, (ii) skill in conducting capabilities and requirements analysis, (iii) skill to use critical thinking to analyze organizational patterns and relationships, and (iv) skill to understand the operational, financial and policy-related parameters and the effective implementation of cybersecurity in practice.
涵盖的内容
3个视频1个作业
3个视频•总计23分钟
- Introduction and Motivation•4分钟
- Cybersecurity Economics•7分钟
- Gordon Loeb Model (GL) and Return On Security Investment (ROSI)•12分钟
1个作业•总计15分钟
- Cybersecurity economics•15分钟
位教师
授课教师评分
我们要求所有学生根据授课教师的教学风格和质量提供对授课教师的反馈。


授课教师
授课教师评分
我们要求所有学生根据授课教师的教学风格和质量提供对授课教师的反馈。










提供方

提供方

28DIGITAL is Europe’s digital innovation engine, a multi-stakeholder platform, rooted in European values and open to the world. We turn knowledge into innovation, scale start-ups into global ventures, and build the next generation of digital talent to shape a fair, competitive, and human-centric digital future. We work at the intersection of science, business, and society, transforming breakthroughs in AI, cybersecurity, robotics, and advanced computing into solutions that foster digital technology innovation, accelerate the green transition, and improve lives. 28DIGITAL provides online and face-to-face Innovation and Entrepreneurship education to raise quality, increase diversity, and expand the availability of top-level content from 20 leading technical universities across Europe. The universities deliver a unique blend of the best of technical excellence, entrepreneurial skills, and mindset to digital engineers and entrepreneurs at all stages of their careers. The academic partners support Coursera’s bold vision to enable anyone, anywhere, to transform their lives by providing access to the world’s best learning experiences. This means that 28DIGITAL gradually shares parts of its entrepreneurial and academic education programmes to demonstrate its excellence and make it accessible to a much wider audience. 28DIGITAL's online education portfolio can be used in blended education settings, in both Master's and Doctorate programmes, and by professionals to update their knowledge.
从 Security 浏览更多内容
状态:免费试用免费试用
状态:免费试用免费试用
状态:预览预览课程
人们为什么选择 Coursera 来帮助自己实现职业发展

Felipe M.

Jennifer J.

Larry W.

Chaitanya A.
常见问题
To access the course materials, assignments and to earn a Certificate, you will need to purchase the Certificate experience when you enroll in a course. You can try a Free Trial instead, or apply for Financial Aid. The course may offer 'Full Course, No Certificate' instead. This option lets you see all course materials, submit required assessments, and get a final grade. This also means that you will not be able to purchase a Certificate experience.
When you purchase a Certificate you get access to all course materials, including graded assignments. Upon completing the course, your electronic Certificate will be added to your Accomplishments page - from there, you can print your Certificate or add it to your LinkedIn profile.
Yes. In select learning programs, you can apply for financial aid or a scholarship if you can’t afford the enrollment fee. If fin aid or scholarship is available for your learning program selection, you’ll find a link to apply on the description page.
更多问题
提供助学金,


