Prepares students for a role as a network security administrator and analyst. Topics include viruses, worms, other attack mechanisms, vulnerabilities and countermeasures, network security protocols, encryption, identity and authentication, scanning, firewalls, security tools, and organizations addressing security. A component of this course is a self-contained team project that, if the student wishes, can be extended into a full operational security system in a follow-course.
通过 Coursera Plus 提高技能,仅需 239 美元/年(原价 399 美元)。立即节省

25 条评论
推荐体验
推荐体验
中级
Ideal for those with 1-2 years of tech experience, this intermediate course enhances skills in network security, threats, and defense strategies.
您将获得的技能
- Network Administration
- Cryptography
- Cyber Operations
- Governance Risk Management and Compliance
- Disaster Recovery
- Cybersecurity
- Computer Security
- Infrastructure Security
- Network Security
- IT Security Architecture
- Application Security
- Cyber Attacks
- Encryption
- Cryptographic Protocols
- Information Systems Security
- NIST 800-53
- Telecommunications
- Data Security
- Security Controls
- Cyber Security Policies
要了解的详细信息

添加到您的领英档案
32 项作业
了解顶级公司的员工如何掌握热门技能

该课程共有9个模块
Welcome to Cyber Security Technologies! This module offers a comprehensive foundation for understanding the dynamic field of cyber security. Students will explore various career pathways within cyber security, gaining insights into the roles, responsibilities, and skills required. This module also delves into current trends affecting the cyber landscape and provides an overview of information security principles, including risk management strategies. Through this exploration, students will be equipped with the knowledge to navigate and contribute to the field of cyber security effectively.
涵盖的内容
12个视频6篇阅读材料4个作业2个讨论话题
12个视频•总计75分钟
- Course Overview•1分钟
- Instructor Introduction•2分钟
- Module 1 Introduction•1分钟
- Careers in Cyber Security - Part 1•10分钟
- Careers in Cyber Security - Part 2•7分钟
- Exploring Cyber Security Trends - Part 1•8分钟
- Exploring Cyber Security Trends - Part 2•7分钟
- Information Security and Risk Management - Part 1•7分钟
- Information Security and Risk Management - Part 2•6分钟
- Module 1 Lab - Cyber Seek and Intro to NICE - Part 1•8分钟
- Module 1 Lab - Cyber Seek and Intro to NICE - Part 2•8分钟
- Module 1 Lab - Cyber Seek and Intro to NICE - Part 3•10分钟
6篇阅读材料•总计210分钟
- Syllabus•10分钟
- Careers in Cyber Security•60分钟
- Security Trends•60分钟
- Information Security and Risk Management •60分钟
- Module 1 Lab Activity: Downloading and Setting Up Virtual Machines with Ubuntu and Kali Linux•10分钟
- Module 1 Summary•10分钟
4个作业•总计165分钟
- Module 1 Summative Assessment•120分钟
- Careers in Cyber Security Quiz•15分钟
- Security Trends Quiz•15分钟
- Information Security and Risk Management Quiz•15分钟
2个讨论话题•总计20分钟
- Meet and Greet Discussion•10分钟
- Module 1 Lab Summary and Discussion•10分钟
In Module 2, learners will delve into the core principles of access control, understanding how proper implementation can strengthen system security. This module includes creating basic Bash scripts, offering practical skills for system administration tasks. Additionally, students will learn to apply the guidelines of the NIST Special Publication 800 Series, ensuring compliance with industry-standard security practices. This module is designed to equip learners with the technical expertise for managing access control and enhancing security through scripting and regulatory frameworks.
涵盖的内容
10个视频5篇阅读材料4个作业1个讨论话题
10个视频•总计70分钟
- Module 2 Introduction•1分钟
- Access Control Fundamentals - Part 1•7分钟
- Access Control Fundamentals - Part 2•6分钟
- Introduction to Bash Scripting - Part 1•8分钟
- Introduction to Bash Scripting - Part 2•5分钟
- NIST SP 800 Series Overview - Part 1•7分钟
- NIST SP 800 Series Overview - Part 2•6分钟
- Module 2 Lab - Lab System Status & Ports - Part 1•9分钟
- Module 2 Lab - Lab System Status & Ports - Part 2•10分钟
- Module 2 Lab - Capturing Traffic - Install Script & Hardening•10分钟
5篇阅读材料•总计200分钟
- Access Control Fundamentals•60分钟
- Introduction to Bash Scripting•60分钟
- NIST SP 800 Series Overview•60分钟
- Module 2 Lab Activity: Developing System Administration Scripts in VIM on Ubuntu•10分钟
- Module 2 Summary•10分钟
4个作业•总计165分钟
- Module 2 Summative Assessment•120分钟
- Access Control Fundamentals Quiz•15分钟
- Introduction to Bash Scripting Quiz•15分钟
- NIST SP 800 Series Overview Quiz•15分钟
1个讨论话题•总计10分钟
- Module 2 Lab Summary and Discussion•10分钟
Module 3 provides an in-depth look at the foundational elements that make up security architecture, enabling learners to evaluate the structure and behavior of secure systems. Students will also assess the effectiveness of the NIST 800-53 security controls, gaining the ability to apply these guidelines to protect information systems. Additionally, this module covers the unique security considerations inherent in virtualization technology, offering insights into how to maintain robust security in increasingly virtualized environments. This module provides students with the evaluative skills necessary to design and critique security architectures within a variety of technological contexts.
涵盖的内容
8个视频5篇阅读材料4个作业1个讨论话题
8个视频•总计50分钟
- Module 3 Introduction•1分钟
- Security Architecture Principles - Part 1•9分钟
- Security Architecture Principles - Part 2•7分钟
- NIST 800-53 Controls•10分钟
- Virtualization Security - Part 1•5分钟
- Virtualization Security - Part 2•6分钟
- Module 3 Lab - C++ Static Code Analysis - Part 1•6分钟
- Module 3 Lab - C++ Static Code Analysis - Part 2•6分钟
5篇阅读材料•总计200分钟
- Security Architecture Principles•60分钟
- NIST 800-53 Controls•60分钟
- Virtualization Security•60分钟
- Module 3 Lab Activity: Understanding and Implementing the Risk Management Framework (RMF) Process•10分钟
- Module 3 Summary•10分钟
4个作业•总计165分钟
- Module 3 Summative Assessment•120分钟
- Security Architecture Principles Quiz•15分钟
- NIST 800-53 Controls Quiz•15分钟
- Virtualization Security Quiz•15分钟
1个讨论话题•总计10分钟
- Module 3 Lab Summary and Discussion•10分钟
Module 4 offers a deep dive into the critical, often overlooked aspects of security that go beyond the digital realm. Learners will acquire the knowledge to apply fundamental physical security measures, understanding the vital role these play in comprehensive security strategy. This module also explores the environmental factors that impact security, from natural disasters to climate control, and evaluates the technologies — from biometrics to surveillance systems — that are employed to enhance physical security measures. Through this module, students will be equipped to assess and improve the physical and environmental security aspects of various organizations.
涵盖的内容
9个视频5篇阅读材料4个作业1个讨论话题
9个视频•总计60分钟
- Module 4 Introduction•1分钟
- Physical and Environmental Security in Cybersecurity - Part 1•8分钟
- Physical and Environmental Security in Cybersecurity - Part 2•9分钟
- Environmental Security in Data Centers - Part 1•7分钟
- Environmental Security in Data Centers - Part 2•6分钟
- Physical and Environmental Security Technologies - Part 1•8分钟
- Physical and Environmental Security Technologies - Part 2•9分钟
- Module 4 Lab - Global Terrorism Database High Level Overview - Part 1•7分钟
- Module 4 Lab - Global Terrorism Database High Level Overview - Part 2•6分钟
5篇阅读材料•总计200分钟
- Physical Security Fundamentals•60分钟
- Environmental Security Considerations•60分钟
- Security Technologies for Physical Protection•60分钟
- Module 4 Lab Activity: Exploring the START Lab Global Terrorism Database (GTD)•10分钟
- Module 4 Summary•10分钟
4个作业•总计165分钟
- Module 4 Summative Assessment•120分钟
- Physical Security Fundamentals Quiz•15分钟
- Environmental Security Considerations Quiz•15分钟
- Security Technologies for Physical Protection Quiz•15分钟
1个讨论话题•总计10分钟
- Module 4 Lab Summary and Discussion•10分钟
Module 5 provides an essential exploration of the strategies and tools necessary for protecting both private and enterprise networks. Students will delve into the basics of network security, gaining the skills to analyze vulnerabilities and implement effective security measures. This module further details the intricacies of securing telecommunications systems, including an evaluation of various network security protocols, ensuring that learners are prepared to address the challenges presented by the diverse array of communication technologies in use today.
涵盖的内容
8个视频5篇阅读材料4个作业1个讨论话题
8个视频•总计51分钟
- Module 5 Introduction•1分钟
- Safeguarding Digital Infrastructure - Part 1•5分钟
- Safeguarding Digital Infrastructure - Part 2•6分钟
- Securing Wireless Networks•8分钟
- Safeguarding Digital Communications•7分钟
- Module 5 Lab - Nmap and UFW•11分钟
- Module 5 Lab - Wireshark and Data Visualization - Part 1•4分钟
- Module 5 Lab - Wireshark and Data Visualization - Part 2•9分钟
5篇阅读材料•总计200分钟
- Network Security Fundamentals•60分钟
- Telecommunications Security•60分钟
- Security Protocols•60分钟
- Module 5 Lab Activity: Installing and Using Wireshark, UFW, GUFW, and Nmap on Ubuntu •10分钟
- Module 5 Summary•10分钟
4个作业•总计165分钟
- Module 5 Summative Assessment•120分钟
- Network Security Fundamentals Quiz•15分钟
- Telecommunications Security Quiz•15分钟
- Security Protocols Quiz•15分钟
1个讨论话题•总计10分钟
- Module 5 Lab Summary and Discussion•10分钟
Module 6 demystifies the complex world of cryptography, providing learners with a clear understanding of its fundamental principles and the pivotal role it plays in securing information. Students will critically evaluate various cryptographic algorithms, from classic ciphers to cutting-edge public-key cryptosystems, to understand their applications and limitations. This module provides opportunities to create practical applications of cryptography, giving learners valuable experience in employing cryptographic techniques to real-world security challenges.
涵盖的内容
6个视频5篇阅读材料4个作业1个讨论话题
6个视频•总计43分钟
- Module 6 Introduction•1分钟
- Fundamentals of Cryptography - Part 1•7分钟
- Fundamentals of Cryptography - Part 2•5分钟
- Cryptographic Algorithms - Securing Digital Information•10分钟
- Applications of Cryptography in Network Security•9分钟
- Module 6 Lab - Email Encryption•11分钟
5篇阅读材料•总计200分钟
- Understand the Basics of Cryptography•60分钟
- Cryptographic Algorithms•60分钟
- Applications of Cryptography•60分钟
- Module 6 Lab Activity: Installing and Using Thunderbird for Email Encryption, VeraCrypt, and Tor on Ubuntu •10分钟
- Module 6 Summary•10分钟
4个作业•总计165分钟
- Module 6 Summative Assessment•120分钟
- Understand the Basics of Cryptography Quiz•15分钟
- Cryptographic Algorithms Quiz•15分钟
- Applications of Cryptography Quiz•15分钟
1个讨论话题•总计10分钟
- Module 6 Lab Summary and Discussion•10分钟
Module 7 equips learners with the skills to ensure that organizations can continue operating in the face of disruptions and quickly recover from any form of disaster. Through detailed exploration, students will grasp the core principles of business continuity planning and delve into analyzing various disaster recovery strategies, understanding their applicability and effectiveness. Additionally, this module offers a deep dive into the critical processes of risk assessment and management, enabling learners to identify potential threats and devise operational responses that minimize impact and facilitate swift recovery.
涵盖的内容
9个视频5篇阅读材料4个作业1个讨论话题
9个视频•总计68分钟
- Module 7 Introduction•1分钟
- Safeguarding Your Organization - Part 1•8分钟
- Safeguarding Your Organization - Part 2•6分钟
- Safeguarding Business Continuity - Part 1•7分钟
- Safeguarding Business Continuity - Part 2•7分钟
- Risk Assessment and Management in Cybersecurity - Part 1•9分钟
- Risk Assessment and Management in Cybersecurity - Part 2•10分钟
- Module 7 Lab - Risk Management Log and POA&M - Part 1•10分钟
- Module 7 Lab - Risk Management Log and POA&M - Part 2•10分钟
5篇阅读材料•总计200分钟
- Business Continuity Planning•60分钟
- Disaster Recovery Strategies•60分钟
- Risk Assessment and Management•60分钟
- Module 7 Lab Activity: Business Continuity Planning, Disaster Recovery Strategies, and Risk Assessment•10分钟
- Module 7 Summary•10分钟
4个作业•总计165分钟
- Module 7 Summative Assessment•120分钟
- Business Continuity Planning Quiz•15分钟
- Disaster Recovery Strategies Quiz•15分钟
- Risk Assessment and Management Quiz•15分钟
1个讨论话题•总计10分钟
- Module 7 Lab Summary and Discussion•10分钟
Module 8 offers an in-depth look at the complex landscape of laws and regulations shaping the cybersecurity domain. Students will explore a wide spectrum of legal and regulatory issues, gaining an understanding of how these frameworks impact both individuals and organizations in the field of cybersecurity. Moreover, this module dives into the analysis of different compliance frameworks, equipping learners with the knowledge to navigate and adhere to various global and regional regulations, thereby ensuring that cybersecurity practices meet legal obligations and industry standards.
涵盖的内容
9个视频4篇阅读材料3个作业1个讨论话题
9个视频•总计57分钟
- Module 8 Introduction•1分钟
- Legal and Regulatory Issues in Cybersecurity - Part 1•5分钟
- Legal and Regulatory Issues in Cybersecurity - Part 2•6分钟
- Compliance Framework in Cybersecurity - Part 1•6分钟
- Compliance Framework in Cybersecurity - Part 2•8分钟
- Module 8 Lab - Maltego Walkthrough - Part 1•9分钟
- Module 8 Lab - Maltego Walkthrough - Part 2•7分钟
- Module 8 Lab - Maltego Walkthrough - Part 3•8分钟
- Module 8 Lab - Maltego Walkthrough - Part 4•7分钟
4篇阅读材料•总计140分钟
- Legal and Regulatory Issues•60分钟
- Compliance Frameworks•60分钟
- Module 8 Lab Activity: Legal and Regulatory Issues and Compliance Frameworks in Cybersecurity•10分钟
- Module 8 Summary•10分钟
3个作业•总计150分钟
- Module 8 Summative Assessment•120分钟
- Legal and Regulatory Issues Quiz•15分钟
- Compliance Frameworks Quiz•15分钟
1个讨论话题•总计10分钟
- Module 8 Lab Summary and Discussion•10分钟
This module contains the summative course assessment that has been designed to evaluate your understanding of the course material and assess your ability to apply the knowledge you have acquired throughout the course.
涵盖的内容
1个作业
1个作业•总计180分钟
- Course Summative Assessment•180分钟
攻读学位
课程 是 Illinois Tech提供的以下学位课程的一部分。如果您被录取并注册,您已完成的课程可计入您的学位学习,您的学习进度也可随之转移。
攻读学位
课程 是 Illinois Tech提供的以下学位课程的一部分。如果您被录取并注册,您已完成的课程可计入您的学位学习,您的学习进度也可随之转移。
Illinois Tech
Bachelor of Information Technology
学位
必须成功申请并注册。资格要求适用。各院校会根据您现有的学分情况,确定完成本课程后可计入学位要求的学分。单击特定课程了解更多信息。
位教师
授课教师评分
我们要求所有学生根据授课教师的教学风格和质量提供对授课教师的反馈。


提供方

提供方

Illinois Tech is a top-tier, nationally ranked, private research university with programs in engineering, computer science, architecture, design, science, business, human sciences, and law. The university offers bachelor of science, master of science, professional master’s, and Ph.D. degrees—as well as certificates for in-demand STEM fields and other areas of innovation. Talented students from around the world choose to study at Illinois Tech because of the access to real-world opportunities, renowned academic programs, high value, and career prospects of graduates.
从 Computer Security and Networks 浏览更多内容
状态:预览预览BBall State University
课程
状态:免费试用免费试用
状态:免费试用免费试用MMacquarie University
课程
状态:免费试用免费试用UUniversity of London
专项课程
人们为什么选择 Coursera 来帮助自己实现职业发展

Felipe M.

Jennifer J.

Larry W.

Chaitanya A.
学生评论
25 条评论
- 5 stars
68%
- 4 stars
20%
- 3 stars
4%
- 2 stars
4%
- 1 star
4%
显示 3/25 个
已于 Oct 10, 2025审阅
thank you CST it helps lot to me and improved knowledge in new things
常见问题
To access the course materials, assignments and to earn a Certificate, you will need to purchase the Certificate experience when you enroll in a course. You can try a Free Trial instead, or apply for Financial Aid. The course may offer 'Full Course, No Certificate' instead. This option lets you see all course materials, submit required assessments, and get a final grade. This also means that you will not be able to purchase a Certificate experience.
When you purchase a Certificate you get access to all course materials, including graded assignments. Upon completing the course, your electronic Certificate will be added to your Accomplishments page - from there, you can print your Certificate or add it to your LinkedIn profile.
Yes. In select learning programs, you can apply for financial aid or a scholarship if you can’t afford the enrollment fee. If fin aid or scholarship is available for your learning program selection, you’ll find a link to apply on the description page.
更多问题
提供助学金,

