Cyber Security

Cyber Security: Protect and Defend
4.1 (7,610 ratings) Instead of using a simple lifetime average, Udemy calculates a
course's star rating by considering a number of different factors
such as the number of ratings, the age of ratings, and the
likelihood of fraudulent ratings.
78,956 students enrolled
Free
Start Learning Now
  • Lectures 15
  • Length 2.5 hours
  • Skill Level All Levels
  • Languages English
  • Includes Lifetime access
    30 day money back guarantee!
    Available on iOS and Android
    Certificate of Completion
Wishlisted Wishlist

How taking a course works

Discover

Find online courses made by experts from around the world.

Learn

Take your courses with you and learn anywhere, anytime.

Master

Learn and practice real-world skills and achieve your goals.

About This Course

Published 4/2014 English

Course Description

Cyber Security is one of today's hottest career fields. This course will provide a broad overview of cyber security concepts and practices. Starting with threat analysis and risk management, additional lessons explore core technologies such as encryption, firewalls, and intrusion detection systems. Cloud security is also featured, as are incident response, disaster recovery, and how to conduct cyber exercises.

The course unfolds over 12 video lessons and supplemental materials. Videos include statements from leaders in cyber security on potential careers and how to train for them. Learning is self-paced, but the full series can be experienced in about two weeks.

What are the requirements?

  • A computer that connects to the internet
  • Some technical background in hardware, software, or applications will be helpful.

What am I going to get from this course?

  • Students will understand major concepts and strategies in cyber security.
  • Students will identify core technologies for securing networks.
  • Students will learn how to train for available career opportunities in cyber security.

What is the target audience?

  • Undergraduates
  • Job seekers
  • Cyber security competition participants
  • Anyone with an interest in cyber security

What you get with this course?

Not for you? No problem.
30 day money back guarantee.

Forever yours.
Lifetime access.

Learn on the go.
Desktop, iOS and Android.

Get rewarded.
Certificate of completion.

Curriculum

09:31

Is there such a thing as a good hacker? We’ll explore that question in today’s lesson about hackers and hacking. This lecture is the first in a twelve part series about information security. But in many ways, this lesson provides the motivation for all the other ones.

Resources:

Articles:

Would you like more information about DeVry University degree programs? Email us at dvumooc@devry.edu.

Devry University

Section 1: My First Section
11:27

Last time we focused on hackers and what motivates them to break into computer systems. This time we’re going to dig deeper into how hackers hack.

Resources:

Devry University

10:26

This lesson focuses on how to create security controls in the ever-changing world of information technology.

Resources:

11:50

In this lesson we consider the technical means by which data can be kept secret. Our topic this time is cryptography, the science of encryption.

Devry University

11:31

Any information security technology needs to distinguish between those who are authorized and those who are not authorized to access the data. Strong Locks and keys that even the owner does not understand or remember are not very useful for security systems! Likewise, if a lock is easy to open, it wouldn’t be much of a security system either. The foundation of that authentication process is called identity. To gain access on a computer system depends on your identity. But how does the system really know who you are? Some sort of proof will be required, and such proof is called authentication. Identity and authentication systems are the topic of this lesson.

Would you like more information about DeVry University degree programs? Email us at dvumooc@devry.edu.

Devry University

11:37

Any security system effectively has to ask the question “who goes there?” in order to get the job done. Even when your messages travel to the far ends of the Internet, the receiving party needs some way to verify who really sent the message. User names and passwords are fairly easily intercepted and spoofed. There needs to be stronger ways to verify that a message is what it claims to be and that the sender is authentic. In this lesson we can learn about two of these technologies. First let’s examine digital signatures and digital certificates.

Devry University

11:39

In this lesson we are going to be learning about Firewalls.

Devry University

11:44

In this lesson, we’ll peer into cloud computing in a way that will make the cloud a little less mysterious. We’ll learn that resource sharing – servers, storage, applications, and bandwidth – is one of the defining elements of cloud computing. But with such resource sharing comes with security concerns.

Devry University

11:13

Up until now we’ve only considered preventative controls. But no control can prevent every type of attack. So beyond preventative controls, we also need controls that detect and correct. Two such controls are called Intrusion Detection Systems and Intrusion Prevention Systems.

Devry University

11:49

In this lesson we are going to learn the process for incident response.

Resources:

Devry University

10:59

In this lesson we can learn how contingency planning can help an organization prepare for the worst disasters when they strike.


Devry University

06:16

In this final lesson, we’re going to put into practice everything we have studied so far. You will have a chance to draft your own information security plan, guarding data that is valuable to you. If you desire, you can make your plans realistic and apply them to an actual business, personal, or organizational situation. Or, if you prefer, you can make your plans fanciful and make a game out of the activity. Either way, you will get a chance to experience one type of planning exercise that is commonly practiced by information security professionals.

Devry University

04:19

Podcast: Cyber Security Careers

Dev

End of Course Information
Article
IFrame

Devry University

Students Who Viewed This Course Also Viewed

  • Loading
  • Loading
  • Loading

Instructor Biography

The mission of DeVry University is to foster student learning through high-quality, career-oriented education integrating technology, science, business and the arts. The university delivers practitioner-oriented undergraduate and graduate programs onsite and online to meet the needs of a diverse and geographically dispersed student population.

Instructor Biography

Ready to start learning?
Start Learning Now