Packt

Cyber Resilience: Building Strong Cybersecurity Systems

通过 Coursera Plus 提高技能,仅需 239 美元/年(原价 399 美元)。立即节省

Packt

Cyber Resilience: Building Strong Cybersecurity Systems

包含在 Coursera Plus

深入了解一个主题并学习基础知识。
初级 等级

推荐体验

1 周 完成
在 10 小时 一周
灵活的计划
自行安排学习进度
深入了解一个主题并学习基础知识。
初级 等级

推荐体验

1 周 完成
在 10 小时 一周
灵活的计划
自行安排学习进度

您将学到什么

  • Understand the evolving cyber threat landscape.

  • Apply core principles of cybersecurity risk management.

  • Implement defense-in-depth strategies for system security.

要了解的详细信息

可分享的证书

添加到您的领英档案

最近已更新!

April 2026

作业

27 项作业

授课语言:英语(English)

了解顶级公司的员工如何掌握热门技能

Petrobras, TATA, Danone, Capgemini, P&G 和 L'Oreal 的徽标

该课程共有27个模块

In this section, we examine the dynamic cyber threat landscape, focusing on rapid vulnerability exploitation and the challenges of timely patching for effective risk management.

涵盖的内容

2个视频1篇阅读材料1个作业

In this section, we examine legal and contractual requirements shaping security practices. Key concepts include data privacy laws, critical infrastructure standards, and contractual obligations for compliance and accountability.

涵盖的内容

1个视频1篇阅读材料1个作业

In this section, we define key security terminology, distinguish between security events and incidents, and apply defence in depth principles to enhance threat management practices.

涵盖的内容

1个视频2篇阅读材料1个作业

In this section, we explore security trade-offs and how to make balanced decisions for effective protection.

涵盖的内容

1个视频2篇阅读材料1个作业

In this section, we examine the three security pillars-people, processes, and technology-and their interdependence in mitigating risks through training, policies, and practical implementation.

涵盖的内容

1个视频1篇阅读材料1个作业

In this section, we explore defence in depth, focusing on prevention, detection, and response to enhance cyber resilience and manage threats effectively.

涵盖的内容

1个视频2篇阅读材料1个作业

In this section, we map reference controls to defence-in-depth layers, emphasizing risk-based selection and multi-layered security implementation for practical cyber resilience.

涵盖的内容

1个视频1篇阅读材料1个作业

In this section, we explore practical steps for aligning security frameworks with organisational needs, defining clear objectives, and conducting gap analyses to identify weaknesses.

涵盖的内容

1个视频1篇阅读材料1个作业

In this section, we explore asset management, focusing on identifying information assets, maintaining accurate inventories, and optimising usage for security and cost efficiency.

涵盖的内容

1个视频1篇阅读材料1个作业

In this section, we examine how board-level commitment influences cybersecurity success. Key concepts include executive support, strategic alignment, and leadership impact on security outcomes.

涵盖的内容

1个视频1篇阅读材料1个作业

In this section, we explore business continuity management, focusing on risk mitigation, plan development, and disruption response to ensure organizational resilience and operational continuity.

涵盖的内容

1个视频1篇阅读材料1个作业

In this section, we explore configuration hardening and patch management to reduce security risks. Key concepts include disabling unnecessary functions, applying updates, and minimizing attack surfaces.

涵盖的内容

1个视频1篇阅读材料1个作业

In this section, we explore continual improvement processes to adapt security measures to evolving threats. Key concepts include threat analysis, risk mitigation, and maintaining security maturity through regular adjustments.

涵盖的内容

1个视频1篇阅读材料1个作业

In this section, we explore encryption techniques for securing data at rest and in transit, evaluate encryption alternatives, and emphasize secure key management practices for real-world data protection.

涵盖的内容

1个视频1篇阅读材料1个作业

In this section, we examine external certification benefits, including trust building, compliance, and business growth, while exploring frameworks like Cyber Essentials and ISO 27001 for structured security strategies.

涵盖的内容

1个视频1篇阅读材料1个作业

In this section, we examine IAAA controls, the need to know principle, and least privilege to manage user access and reduce security risks in organisations.

涵盖的内容

1个视频1篇阅读材料1个作业

In this section, we examine incident response management, emphasizing prepared plans, detection measures, and defense-in-depth strategies to minimize breach impacts.

涵盖的内容

1个视频1篇阅读材料1个作业

In this section, we examine internal audits as tools for verifying security measures against standards, identifying weaknesses, and supporting continual improvement through objective evaluation.

涵盖的内容

1个视频1篇阅读材料1个作业

In this section, we examine malware protection strategies, including anti-malware software, firewalls, data scanning, and staff training to reduce infection risks through technical and human measures.

涵盖的内容

1个视频1篇阅读材料1个作业

In this section, we explore network asset identification, security zone organization, and implementation of firewalls and DMZs to enhance network protection and data security.

涵盖的内容

1个视频1篇阅读材料1个作业

In this section, we examine physical and environmental security measures, emphasizing secure perimeters, hardware protection, and environmental risk analysis to enhance overall system integrity.

涵盖的内容

1个视频1篇阅读材料1个作业

In this section, we explore continuous security monitoring, log generation, and analysis for detecting threats and supporting incident response. Key concepts include real-time observation, log management, and forensic readiness.

涵盖的内容

1个视频1篇阅读材料1个作业

In this section, we examine how documented security policies and procedures ensure organisational compliance, consistency, and accountability, while highlighting the importance of continuous policy review and alignment with evolving requirements.

涵盖的内容

1个视频1篇阅读材料1个作业

In this section, we explore tailored security training for dedicated roles and general staff, emphasizing effective risk management through role-specific programs and awareness strategies.

涵盖的内容

1个视频1篇阅读材料1个作业

In this section, we examine supply chain security, emphasizing due diligence, SLA reviews, and risk assessments to mitigate third-party vulnerabilities.

涵盖的内容

1个视频1篇阅读材料1个作业

In this section, we examine system risks based on access types, implement input sanitisation for web services, and design security measures for system interactions.

涵盖的内容

1个视频1篇阅读材料1个作业

In this section, we explore vulnerability scanning and penetration testing to identify system weaknesses. Key concepts include using tools, analyzing results, and integrating security testing into programs.

涵盖的内容

1个视频1篇阅读材料1个作业

位教师

Packt - Course Instructors
Packt
1,626 门课程470,931 名学生

提供方

Packt

人们为什么选择 Coursera 来帮助自己实现职业发展

Felipe M.

自 2018开始学习的学生
''能够按照自己的速度和节奏学习课程是一次很棒的经历。只要符合自己的时间表和心情,我就可以学习。'

Jennifer J.

自 2020开始学习的学生
''我直接将从课程中学到的概念和技能应用到一个令人兴奋的新工作项目中。'

Larry W.

自 2021开始学习的学生
''如果我的大学不提供我需要的主题课程,Coursera 便是最好的去处之一。'

Chaitanya A.

''学习不仅仅是在工作中做的更好:它远不止于此。Coursera 让我无限制地学习。'
Coursera Plus

通过 Coursera Plus 开启新生涯

无限制访问 10,000+ 世界一流的课程、实践项目和就业就绪证书课程 - 所有这些都包含在您的订阅中

通过在线学位推动您的职业生涯

获取世界一流大学的学位 - 100% 在线

加入超过 3400 家选择 Coursera for Business 的全球公司

提升员工的技能,使其在数字经济中脱颖而出

常见问题