Об этом курсе
4.7
Оценки: 382
Рецензии: 96
This course provides learners with a baseline understanding of common cyber security threats, vulnerabilities, and risks. An overview of how basic cyber attacks are constructed and applied to real systems is also included. Examples include simple Unix kernel hacks, Internet worms, and Trojan horses in software utilities. Network attacks such as distributed denial of service (DDOS) and botnet- attacks are also described and illustrated using real examples from the past couple of decades. Familiar analytic models are outlined such as the confidentiality/integrity/availability (CIA) security threat framework, and examples are used to illustrate how these different types of threats can degrade real assets. The course also includes an introduction to basic cyber security risk analysis, with an overview of how threat-asset matrices can be used to prioritize risk decisions. Threats, vulnerabilities, and attacks are examined and mapped in the context of system security engineering methodologies....
Globe

Только онлайн-курсы

Начните сейчас и учитесь по собственному графику.
Calendar

Гибкие сроки

Назначьте сроки сдачи в соответствии со своим графиком.
Beginner Level

Начальный уровень

Clock

Approx. 11 hours to complete

Предполагаемая нагрузка: 8 hours/week...
Comment Dots

English

Субтитры: English...

Приобретаемые навыки

CybersecurityInformation Security (INFOSEC)Denial-Of-Service Attack (DOS)Risk Assessment
Globe

Только онлайн-курсы

Начните сейчас и учитесь по собственному графику.
Calendar

Гибкие сроки

Назначьте сроки сдачи в соответствии со своим графиком.
Beginner Level

Начальный уровень

Clock

Approx. 11 hours to complete

Предполагаемая нагрузка: 8 hours/week...
Comment Dots

English

Субтитры: English...

Программа курса: что вы изучите

Week
1
Clock
5 ч. на завершение

Introduction to Cyber Security

This module provides exposure to basic cyber security concepts including some simple, foundational attack methods....
Reading
10 видео (всего 47 мин.), 6 материалов для самостоятельного изучения, 1 тест
Video10 видео
Assignments and Reading2мин
Hacking an Old-Fashioned Soda Machine4мин
Simple Worm Program4мин
Trojan Horse Login Program7мин
Malicious Compiler Program8мин
Typical Unix Kernel Attack6мин
Explaining Interview Seriesмин
Welcome Lou Manousos (Part 1)5мин
Welcome Lou Manousos (Part 2)4мин
Reading6 материала для самостоятельного изучения
Required: Smashing the Stack for Fun and Profit,” Aleph One30мин
Required: “Reflections on Trusting Trust,” Ken Thompson30мин
Video: DEF CON 2346мин
Video: Kevin Mitnick | Talks at Google52мин
Suggested: Introduction to Cyber Security (Ch. 1-2)30мин
Suggested: TCP/IP Illustrated Volume 1 (2nd Ed.), (Ch. 1-2)30мин
Quiz1 практическое упражнение
Module 1 Quiz20мин
Week
2
Clock
5 ч. на завершение

Understanding Basic Security Frameworks

This module introduces some fundamental frameworks, models, and approaches to cyber security including the CIA model....
Reading
17 видео (всего 85 мин.), 6 материалов для самостоятельного изучения, 3 тестов
Video17 видео
Purpose of Cyber Security4мин
Adversary Types7мин
Vulnerability Types5мин
Threat Types5мин
Matching Quiz1мин
Matching Quiz Solution1мин
Confidentiality Threat6мин
Integrity Threat6мин
Availability Threat5мин
Fraud Threat5мин
Testing for Vultnerabilities4мин
Attacks4мин
Brute Force vs. Hueristic Attacks3мин
Crytanalysis5мин
Cryptanalyzing Caesar Cipher4мин
Welcome Jose Dominguez9мин
Reading6 материала для самостоятельного изучения
Required: “Why Cryptosystems Fail,” Ross Anderson30мин
Required: “There Be Dragons,” Steve Bellovin30мин
Video: DMARC Whiteboard Session15мин
Video: Defcon 1822мин
Suggested: Introduction to Cyber Security, (Ch. 3 - 4)30мин
Suggested: TCP/IP Illustrated Volume 1 (2nd Ed.), (Ch. 3 – 4)30мин
Quiz3 практического упражнения
Matching Quiz6мин
Further Consideration - Fraud2мин
Module 2 Quiz20мин
Week
3
Clock
4 ч. на завершение

Examining Cyber Threats More Closely

This module covers some of the more intense attacks over the past decade including worms and DDOS attacks....
Reading
10 видео (всего 81 мин.), 6 материалов для самостоятельного изучения, 2 тестов
Video10 видео
SQL/ Slammer Worm of 20034мин
Nachi Worm of 20039мин
Botnet Design12мин
Botnet Arithmetic10мин
Welcome Elad Yoran11мин
Assets and Infrastructure8мин
Calculating Risk8мин
Making Security and Cost Decisions Based on Risk5мин
Threat Trees and Completeness of Analysis6мин
Reading6 материала для самостоятельного изучения
Required: “Hackers Remotely Kill a Jeep on the Highway with Me in It,” Andy Greenberg, Wired Magazine10мин
Required: “A Hacker’s Evolution: Austin’s HD Moore Grew Up with Cybersecurity Industry,” 512 Tech10мин
Suggested: Introduction to Cyber Security (Ch. 5 - 6)30мин
Suggested: TCP/IP Illustrated Volume 1 (2nd Edition), (Ch. 5 - 6)30мин
Video: “Top Hacker Shows Us How It’s Done,” Pablos Holman, TEDx Midwest18мин
Video: “All Your Devices Can be Hacked,” Avi Rubin, TED Talk17мин
Quiz2 практического упражнения
Further Consideration - Threat Trees2мин
Module 3 Quiz20мин
Week
4
Clock
4 ч. на завершение

Introducing Security Risk Analysis

This module introduces basic engineering and analysis methods for managing cyber security risk to valued assets....
Reading
8 видео (всего 61 мин.), 8 материалов для самостоятельного изучения, 2 тестов
Video8 видео
Mapping Assets to Threats7мин
Estimating Risk for Threat-Asset Pairs5мин
Example Case Study Matrix (Part 1)8мин
Example Case Study Matrix (Part 2)9мин
Example Case Study Matrix (Part 3)7мин
Mapping Assets, Threats, Vulnerabilities, and Attacks5мин
Welcome Nasir Memon14мин
Reading8 материала для самостоятельного изучения
Required: “A Man-in-the-Middle Attack on UMTS,” Meyer and Wetzel10мин
Required: “Are Computer Hacker Break-Ins Ethical?” Eugene Spafford10мин
Video: “What’s Wrong With Your Password,” Lorrie Faith Cranor, TED Talk18мин
Video: “Fighting Viruses, Defending the Net,” Mikko Hypponen, TED Talk17мин
Suggested: Introduction to Cyber Security, (Ch. 7 - 8)30мин
Suggested: TCP/IP Illustrated Volume 1 (2nd Ed.), (Ch. 7 – 8)30мин
Project Description10мин
Additional Self-Learning Opportunities10мин
Quiz2 практического упражнения
Module 4 Quiz20мин
Final Quiz - What level of security risk do you estimate for the following threat-asset matrix entries for the ACME Software Company:18мин
4.7
Direction Signs

40%

начал новую карьеру, пройдя эти курсы
Briefcase

83%

получил значимые преимущества в карьере благодаря этому курсу
Money

20%

стал больше зарабатывать или получил повышение

Лучшие рецензии

автор: AAFeb 26th 2018

Great introduction to cybersecurity concepts with relevant supplemental material in the form of journal papers, magazine articles and supporting TED talks and videos. Highly recommended!

автор: JEMar 2nd 2018

I love this instructor. He makes learning a lot more fun , especially when he gives a real world description of the point he's trying to get across. Well done :) Thanks for this course!

Преподаватель

Dr. Edward G. Amoroso

Research Professor, NYU and CEO, TAG Cyber LLC
Computer Science

О New York University Tandon School of Engineering

Tandon offers comprehensive courses in engineering, applied science and technology. Each course is rooted in a tradition of invention and entrepreneurship....

О специализации ''Introduction to Cyber Security'

Introduction to Cyber Security was designed to help learners develop a deeper understanding of modern information and system protection technology and methods. The learning outcome is simple: We hope learners will develop a lifelong passion and appreciation for cyber security, which we are certain will help in future endeavors. Students, developers, managers, engineers, and even private citizens will benefit from this learning experience. Special customized interviews with industry partners were included to help connect the cyber security concepts to live business experiences....
Introduction to Cyber Security

Часто задаваемые вопросы

  • Once you enroll for a Certificate, you’ll have access to all videos, quizzes, and programming assignments (if applicable). Peer review assignments can only be submitted and reviewed once your session has begun. If you choose to explore the course without purchasing, you may not be able to access certain assignments.

  • When you enroll in the course, you get access to all of the courses in the Specialization, and you earn a certificate when you complete the work. Your electronic Certificate will be added to your Accomplishments page - from there, you can print your Certificate or add it to your LinkedIn profile. If you only want to read and view the course content, you can audit the course for free.

Остались вопросы? Посетите Центр поддержки учащихся.