Digital Shield: Cybersecurity for Data and Systems Protection" is a course designed to provide a solid introduction to the protection of sensitive data and the infrastructure supporting various information systems.
通过 Coursera Plus 提高技能,仅需 239 美元/年(原价 399 美元)。立即节省

要了解的详细信息

添加到您的领英档案
100 项作业
了解顶级公司的员工如何掌握热门技能

该课程共有7个模块
涵盖的内容
3篇阅读材料1个讨论话题
3篇阅读材料•总计8分钟
- Welcome•4分钟
- Políticas y lineamientos de calificación•2分钟
- Políticas de Coursera•2分钟
1个讨论话题•总计3分钟
- Bienvenida Presentación•3分钟
涵盖的内容
11个视频10篇阅读材料20个作业10个讨论话题
11个视频•总计39分钟
- Introduction•2分钟
- Basic Concepts and Definitions•4分钟
- Vulnerabilities and Risks•4分钟
- Video•3分钟
- Video•4分钟
- Video•4分钟
- Video•3分钟
- Video•4分钟
- Video•4分钟
- Video•4分钟
- Video•3分钟
10篇阅读材料•总计71分钟
- Basic Concepts and Definitions•6分钟
- Vulnerabilities and Risks•8分钟
- Threats and Models•5分钟
- Threat Model Frameworks•8分钟
- Defense in Depth•6分钟
- Security Controls•5分钟
- Maturity Models•6分钟
- Security Roles in the Organization•10分钟
- Strategies & Metrics•8分钟
- Information Security Governance•9分钟
20个作业•总计109分钟
- Activity: Basic Concepts and Definitions•6分钟
- Activity: Vulnerabilities and Risks•10分钟
- Activity: Threats and Models•5分钟
- Activity: Threat Model Frameworks•6分钟
- Activity: Defense in Depth•3分钟
- Activity: Security Controls•5分钟
- Activity: Maturity Models•5分钟
- Activity: Security Roles in the Organization•7分钟
- Activity: Strategies & Metrics•5分钟
- Activity: Information Security Governance•4分钟
- Review 1: Basic Concepts and Definitions•5分钟
- Review 2: Vulnerabilities and Risks•6分钟
- Review 3: Threats and Models•7分钟
- Review 4: Threat Model Frameworks•5分钟
- Review 5: Defense in Depth•5分钟
- Review 6: Security Controls•5分钟
- Review 7: Maturity Models•5分钟
- Review 8: Security Roles in the Organization•5分钟
- Review 9: Strategies & Metrics•5分钟
- Review 10: Information Security Governance•5分钟
10个讨论话题•总计30分钟
- Discussion: Basic Concepts and Definitions•3分钟
- Discussion: Vulnerabilities and Risks•3分钟
- Discussion: Threats and Models•3分钟
- Discussion: Threat Model Frameworks•3分钟
- Discussion: Defense in Depth •3分钟
- Discussion: Security Controls•3分钟
- Discussion: Maturity Models•3分钟
- Discussion: Security Roles in the Organization•3分钟
- Discussion: Strategies & Metrics•3分钟
- Discussion: Information Security Governance•3分钟
涵盖的内容
10个视频10篇阅读材料20个作业10个讨论话题
10个视频•总计29分钟
- Introduction to Malware•3分钟
- Malware Infection•2分钟
- Types of Malwares•4分钟
- Ransomware•3分钟
- Malware Detection Systems •3分钟
- SandBox Controls•2分钟
- Origin of Malware in Software•3分钟
- Best Practices in Software Development•4分钟
- SAST Static Analysis •2分钟
- DAST Dynamic Analysis •2分钟
10篇阅读材料•总计72分钟
- Introduction to Malware•5分钟
- Malware Infection•6分钟
- Types of Malwares•10分钟
- Ransomware•7分钟
- Malware Detection Systems •10分钟
- SandBox Controls•8分钟
- Origin of Malware in Software•6分钟
- Best Practices in Software Development•5分钟
- SAST Static Analysis •8分钟
- DAST Dynamic Analysis •7分钟
20个作业•总计96分钟
- Activity: Introduction to Malware•5分钟
- Activity: Malware Infection•5分钟
- Activity: Types of Malwares•5分钟
- Activity: Ransomware•5分钟
- Activity: Malware Detection Systems•4分钟
- Activity: SandBox Controls•5分钟
- Activity: Origin of Malware in Software•5分钟
- Activity: Best Practices in Software Development•5分钟
- Activity: SAST Static Analysis•5分钟
- Activity: DAST Dynamic Analysis•5分钟
- Review 1: Introduction to Malware•4分钟
- Review 2: Malware Infection•4分钟
- Review 3: Types of Malwares•5分钟
- Review 4: Ransomware•4分钟
- Review 5: Malware Detection Systems•5分钟
- Review 6: SandBox Controls•6分钟
- Review 7: Origin of Malware in Software•5分钟
- Review 8: Best Practices in Software Development•4分钟
- Review 9: SAST Static Analysis•6分钟
- Review 10: DAST Dynamic Analysis•4分钟
10个讨论话题•总计37分钟
- Discussion: Introduction to Malware•3分钟
- Discussion: Malware Infection•3分钟
- Discussion: Types of Malwares•3分钟
- Discussion: Ransomware•3分钟
- Discussion: Malware Detection Systems•3分钟
- Discussion: SandBox Controls•3分钟
- Discussion: Origin of Malware in Software•10分钟
- Discussion: Best Practices in Software Development•3分钟
- Discussion: SAST Static Analysis•3分钟
- Discussion: DAST Dynamic Analysis•3分钟
涵盖的内容
10个视频10篇阅读材料20个作业10个讨论话题
10个视频•总计33分钟
- Video•4分钟
- Network Models•3分钟
- Physical Layer•3分钟
- Data Link Layer•3分钟
- Network Layer•3分钟
- Data Transport Layer •3分钟
- Application Layer•3分钟
- Secure Communication•3分钟
- Types of Encryptions•4分钟
- Public Key Infrastructure•3分钟
10篇阅读材料•总计89分钟
- Introduction to Networking•7分钟
- Network Models•8分钟
- Physical Layer•10分钟
- Data Link Layer•6分钟
- Network Layer•10分钟
- Data Transport Layer •10分钟
- Application Layer•10分钟
- Secure Communication•10分钟
- Types of Encryptions•10分钟
- Public Key Infrastructure•8分钟
20个作业•总计95分钟
- Activity: Introduction to Networking•4分钟
- Activity: Network Models•4分钟
- Activity: Physical Layer•5分钟
- Activity: Data Link Layer•5分钟
- Activity: Network Layer•4分钟
- Activity: Data Transport Layer•4分钟
- Activity: Application Layer•5分钟
- Activity: Secure Communication•5分钟
- Activity: Types of Encryptions•5分钟
- Activity: Public Key Infrastructure•5分钟
- Review 1: Introduction to Networking•4分钟
- Review 2: Network Models•6分钟
- Review 3: Physical Layer•6分钟
- Review 4: Data Link Layer•5分钟
- Review 5: Network Layer•4分钟
- Review 6: Data Transport Layer•5分钟
- Review 7: Application Layer•5分钟
- Review 8: Secure Communication•5分钟
- Review 9: Types of Encryptions•5分钟
- Review 10: Public Key Infrastructure•4分钟
10个讨论话题•总计30分钟
- Discussion: Introduction to Networking•3分钟
- Discussion: Network Models•3分钟
- Discussion: Physical Layer•3分钟
- Discussion: Data Link Layer•3分钟
- Discussion: Network Layer•3分钟
- Discussion: Data Transport Layer•3分钟
- Discussion: Application Layer•3分钟
- Discussion: Secure Communication•3分钟
- Discussion: Types of Encryptions•3分钟
- Discussion: Public Key Infrastructure•3分钟
涵盖的内容
10个视频10篇阅读材料20个作业10个讨论话题
10个视频•总计25分钟
- Searching on the web•2分钟
- Web Security •2分钟
- HTTP and HTTPS protocols•3分钟
- Metasearch Engines•2分钟
- Cookie Management •3分钟
- DNS•3分钟
- Password Management, Authentication, and MFA•3分钟
- Spoofing and Phishing Techniques•2分钟
- Deep Web and Dark Web•2分钟
- Become Anonymous•2分钟
10篇阅读材料•总计53分钟
- Searching on the web•6分钟
- Web Security •7分钟
- HTTP and HTTPS protocols•5分钟
- Metasearch Engines•4分钟
- Cookie Management •5分钟
- DNS•8分钟
- Password Management, Authentication, and MFA•6分钟
- Spoofing and Phishing Techniques•4分钟
- Deep Web and Dark Web•4分钟
- Become Anonymous•4分钟
20个作业•总计95分钟
- Activity: Searching on the web•5分钟
- Activity: Web Security•5分钟
- Activity: HTTP and HTTPS protocols•5分钟
- Activity: Metasearch Engines•4分钟
- Activity: Cookie Management•4分钟
- Activity: DNS•5分钟
- Activity: Password Management, Authentication, and MFA•5分钟
- Activity: Spoofing and Phishing Techniques•5分钟
- Activity: Deep Web and Dark Web•5分钟
- Activity: Become Anonymous•4分钟
- Review 1: Searching on the web•6分钟
- Review 2: Web Security•5分钟
- Review 3: HTTP and HTTPS protocols•5分钟
- Review 4: Metasearch Engines•4分钟
- Review 5: Cookie Management•5分钟
- Review 6: DNS•5分钟
- Review 7: Password Management, Authentication, and MFA•5分钟
- Review 8: Spoofing and Phishing Techniques•4分钟
- Review 9: Deep Web and Dark Web•5分钟
- Review 10: Become Anonymous•4分钟
10个讨论话题•总计30分钟
- Discussion: Searching on the web•3分钟
- Discussion: Web Security•3分钟
- Discussion: HTTP and HTTPS protocols•3分钟
- Discussion: Metasearch Engines•3分钟
- Discussion: Cookie Management•3分钟
- Discussion: DNS•3分钟
- Discussion: Password Management, Authentication, and MFA•3分钟
- Discussion: Spoofing and Phishing Techniques•3分钟
- Discussion: Deep Web and Dark Web•3分钟
- Discussion: Become Anonymous•3分钟
涵盖的内容
10个视频10篇阅读材料20个作业10个讨论话题
10个视频•总计27分钟
- Social engineering •3分钟
- Social Engineering Techniques•3分钟
- Social Media •3分钟
- Risks and Threats on Social Media•3分钟
- Best Practices for the User•2分钟
- Good practices for a company•3分钟
- Sensitive Searches•3分钟
- Cialdini's Principles •3分钟
- Phishing and Spear Phishing•3分钟
- Mitigation measures•3分钟
10篇阅读材料•总计61分钟
- Social engineering •10分钟
- Social Engineering Techniques•4分钟
- Social Media •6分钟
- Risks and Threats on Social Media•4分钟
- Best Practices for the User•5分钟
- Good practices for a company•5分钟
- Sensitive Searches•8分钟
- Cialdini's Principles •7分钟
- Phishing and Spear Phishing•8分钟
- Mitigation measures•4分钟
20个作业•总计93分钟
- Activity: Social engineering•5分钟
- Activity: Social Engineering Techniques•4分钟
- Activity: Social Media•5分钟
- Activity: Risks and Threats on Social Media•4分钟
- Activity: Best Practices for the User•5分钟
- Activity: Good practices for a company•5分钟
- Activity: Sensitive Searches•5分钟
- Activity: Cialdini's Principles•5分钟
- Activity: Phishing and Spear Phishing•5分钟
- Activity: Mitigation measures•3分钟
- Review 1: Social Engineering•5分钟
- Review 2: Social Engineering Techniques•4分钟
- Review 3: Social Media•5分钟
- Review 4: Risks and Threats on Social Media•4分钟
- Review 5: Best Practices for the User•5分钟
- Review 6: Good practices for the company•5分钟
- Review 7: Sensitive Searches•5分钟
- Review 8: Cialdini's Principles•5分钟
- Review 9: Phishing and Spear Phishing•4分钟
- Review 10: Mitigation measures•5分钟
10个讨论话题•总计30分钟
- Discussion: Social engineering•3分钟
- Discussion: Social Engineering Techniques•3分钟
- Discussion: Social Media•3分钟
- Discussion: Risks and Threats on Social Media•3分钟
- Discussion: Best Practices for the User•3分钟
- Discussion: Good practices for a company•3分钟
- Discussion: Sensitive Searches•3分钟
- Discussion: Cialdini's Principles•3分钟
- Discussion: Phishing and Spear Phishing•3分钟
- Discussion: Mitigation measures•3分钟
涵盖的内容
2篇阅读材料
2篇阅读材料•总计8分钟
- Survey•5分钟
- Muchas felicidades•3分钟
位教师

提供方

提供方

Con más de 50 años de historia, la Universidad Anáhuac, siguiendo nuestro modelo educativo de formación integral sitúa a la persona en el centro del proceso formativo e impulsa su potencial y desarrollo pleno atendiendo las diferentes dimensiones: humana, intelectual, profesional, social y espiritual. Más de 90 mil egresados respaldan nuestra misión como Red de Universidades Anáhuac de: Contribuir a la formación integral de líderes de acción positiva y promover institucionalmente el desarrollo de la persona y de la sociedad, inspirados en los valores del humanismo cristiano.
从 Computer Security and Networks 浏览更多内容
状态:免费试用免费试用
状态:免费试用免费试用
状态:免费试用免费试用LLearnKartS
课程
状态:预览预览NNortheastern University
课程
人们为什么选择 Coursera 来帮助自己实现职业发展

Felipe M.

Jennifer J.

Larry W.

Chaitanya A.
常见问题
To access the course materials, assignments and to earn a Certificate, you will need to purchase the Certificate experience when you enroll in a course. You can try a Free Trial instead, or apply for Financial Aid. The course may offer 'Full Course, No Certificate' instead. This option lets you see all course materials, submit required assessments, and get a final grade. This also means that you will not be able to purchase a Certificate experience.
When you purchase a Certificate you get access to all course materials, including graded assignments. Upon completing the course, your electronic Certificate will be added to your Accomplishments page - from there, you can print your Certificate or add it to your LinkedIn profile.
Yes. In select learning programs, you can apply for financial aid or a scholarship if you can’t afford the enrollment fee. If fin aid or scholarship is available for your learning program selection, you’ll find a link to apply on the description page.
更多问题
提供助学金,

