Cyber Security
4.2 (11,275 ratings)
Instead of using a simple lifetime average, Udemy calculates a course's star rating by considering a number of different factors such as the number of ratings, the age of ratings, and the likelihood of fraudulent ratings.
108,980 students enrolled
Wishlisted Wishlist

Please confirm that you want to add Cyber Security to your Wishlist.

Add to Wishlist

Cyber Security

Cyber Security: Protect and Defend
4.2 (11,275 ratings)
Instead of using a simple lifetime average, Udemy calculates a course's star rating by considering a number of different factors such as the number of ratings, the age of ratings, and the likelihood of fraudulent ratings.
108,980 students enrolled
Last updated 4/2014
English
English
Price: Free
Includes:
  • 2 hours on-demand video
  • 4 mins on-demand audio
  • 1 Article
  • Full lifetime access
  • Access on mobile and TV
  • Certificate of Completion
What Will I Learn?
  • Students will understand major concepts and strategies in cyber security.
  • Students will identify core technologies for securing networks.
  • Students will learn how to train for available career opportunities in cyber security.
View Curriculum
Requirements
  • A computer that connects to the internet
  • Some technical background in hardware, software, or applications will be helpful.
Description

Cyber Security is one of today's hottest career fields. This course will provide a broad overview of cyber security concepts and practices. Starting with threat analysis and risk management, additional lessons explore core technologies such as encryption, firewalls, and intrusion detection systems. Cloud security is also featured, as are incident response, disaster recovery, and how to conduct cyber exercises.

The course unfolds over 12 video lessons and supplemental materials. Videos include statements from leaders in cyber security on potential careers and how to train for them. Learning is self-paced, but the full series can be experienced in about two weeks.

Who is the target audience?
  • Undergraduates
  • Job seekers
  • Cyber security competition participants
  • Anyone with an interest in cyber security
Students Who Viewed This Course Also Viewed
Curriculum For This Course
15 Lectures
02:15:56
+
Hacker Vs Cracker
1 Lecture 09:31

Is there such a thing as a good hacker? We’ll explore that question in today’s lesson about hackers and hacking. This lecture is the first in a twelve part series about information security. But in many ways, this lesson provides the motivation for all the other ones.

Resources:

Articles:

Would you like more information about DeVry University degree programs? Email us at dvumooc@devry.edu.

Devry University

Hacker Vs Cracker
09:31
+
My First Section
14 Lectures 02:06:04

Last time we focused on hackers and what motivates them to break into computer systems. This time we’re going to dig deeper into how hackers hack.

Resources:

Devry University

Malware
11:27

This lesson focuses on how to create security controls in the ever-changing world of information technology.

Resources:

Risk Management
10:26

In this lesson we consider the technical means by which data can be kept secret. Our topic this time is cryptography, the science of encryption.

Devry University

Cryptography
11:50

Any information security technology needs to distinguish between those who are authorized and those who are not authorized to access the data. Strong Locks and keys that even the owner does not understand or remember are not very useful for security systems! Likewise, if a lock is easy to open, it wouldn’t be much of a security system either. The foundation of that authentication process is called identity. To gain access on a computer system depends on your identity. But how does the system really know who you are? Some sort of proof will be required, and such proof is called authentication. Identity and authentication systems are the topic of this lesson.

Would you like more information about DeVry University degree programs? Email us at dvumooc@devry.edu.

Devry University

Identity and Authentication
11:31

Any security system effectively has to ask the question “who goes there?” in order to get the job done. Even when your messages travel to the far ends of the Internet, the receiving party needs some way to verify who really sent the message. User names and passwords are fairly easily intercepted and spoofed. There needs to be stronger ways to verify that a message is what it claims to be and that the sender is authentic. In this lesson we can learn about two of these technologies. First let’s examine digital signatures and digital certificates.

Devry University

Authentication Mechanisms
11:37

In this lesson we are going to be learning about Firewalls.

Devry University

Perimeter Security
11:39

In this lesson, we’ll peer into cloud computing in a way that will make the cloud a little less mysterious. We’ll learn that resource sharing – servers, storage, applications, and bandwidth – is one of the defining elements of cloud computing. But with such resource sharing comes with security concerns.

Devry University

Cloud Security
11:44

Up until now we’ve only considered preventative controls. But no control can prevent every type of attack. So beyond preventative controls, we also need controls that detect and correct. Two such controls are called Intrusion Detection Systems and Intrusion Prevention Systems.

Devry University

Intrusion Detection
11:13

In this lesson we are going to learn the process for incident response.

Resources:

Devry University

Incident Response
11:49

In this lesson we can learn how contingency planning can help an organization prepare for the worst disasters when they strike.


Devry University

Contingency Planning
10:59

In this final lesson, we’re going to put into practice everything we have studied so far. You will have a chance to draft your own information security plan, guarding data that is valuable to you. If you desire, you can make your plans realistic and apply them to an actual business, personal, or organizational situation. Or, if you prefer, you can make your plans fanciful and make a game out of the activity. Either way, you will get a chance to experience one type of planning exercise that is commonly practiced by information security professionals.

Devry University

Table Top Exercise
06:16

Podcast: Cyber Security Careers

Dev

Resources (podcast)
04:19

End of Course Information
01:14

Devry University

Survey
IFrame
About the Instructor
DeVry University MOOC
4.2 Average rating
12,370 Reviews
136,908 Students
3 Courses
The mission of DeVry University is to foster student learning through high-quality, career-oriented education integrating technology, science, business and the arts. The university delivers practitioner-oriented undergraduate and graduate programs onsite and online to meet the needs of a diverse and geographically dispersed student population.
Robert Bunge
4.2 Average rating
11,262 Reviews
108,980 Students
1 Course