About this Course

29,230 recent views
Shareable Certificate
Earn a Certificate upon completion
100% online
Start instantly and learn at your own schedule.
Flexible deadlines
Reset deadlines in accordance to your schedule.
Intermediate Level
Approx. 14 hours to complete
English

Instructor

Shareable Certificate
Earn a Certificate upon completion
100% online
Start instantly and learn at your own schedule.
Flexible deadlines
Reset deadlines in accordance to your schedule.
Intermediate Level
Approx. 14 hours to complete
English

Offered by

Placeholder

University of Colorado System

Syllabus - What you will learn from this course

Content RatingThumbs Up87%(1,039 ratings)Info
Week
1

Week 1

3 hours to complete

Cybersecurity Concepts and Security Principles

3 hours to complete
6 videos (Total 48 min), 5 readings, 2 quizzes
6 videos
Lesson 1. Vulnerabilities and Threats11m
Method, Opportunity, and Motive5m
Confidentiality, Integrity, and Availability13m
Risk, Risk Assessment and Method of Defense7m
Security Principles: Defense in Depth, Defense with Diversity, Cyber Resilience6m
5 readings
Cybersecurity Concepts10m
M.O.M.10m
C.I.A.10m
NIST RMF10m
Defense in Depth10m
1 practice exercise
Exam 1.1. Assess Cybersecurity Concepts and Security Principles Learned42m
Week
2

Week 2

3 hours to complete

Protect Data Access and Verify Source of Trust

3 hours to complete
3 videos (Total 25 min), 3 readings, 2 quizzes
3 videos
Principle of Adequate Data Protection5m
In Software We Trust. Really?9m
3 readings
Apply Principle of Least Privileges for Access Control20m
Inside the Cyberattack that Shocked the US Government", by Brendan Koerner on OPM breach20m
also good to add some additional reading beyond the slides20m
1 practice exercise
Exam 1.2. Assess How to Protect Data Access and Verify Source of Trust30m
Week
3

Week 3

3 hours to complete

Using GPG to Sign/Verify Software

3 hours to complete
3 videos (Total 30 min), 3 readings, 2 quizzes
3 videos
Verify Software Integrity and Authenticity8m
Web of Trust10m
3 readings
The GNU Privacy Handbook30m
Making and verifying signatures20m
How to send/receive encrypted email with GnuPG20m
1 practice exercise
Exam 1.3. Assess the skill of using gpg to sign and verify software.30m
Week
4

Week 4

4 hours to complete

Be a CA, Setup Secure Server and Client Certificate

4 hours to complete
6 videos (Total 71 min), 5 readings, 2 quizzes
6 videos
What are in a Certificate?8m
Being Your Own CA21m
Server Certificate and Installation13m
Setup Client Certificate7m
Client Server Mutual Authentication8m
5 readings
Verisign15m
Secure Web Access15m
Server Certificates15m
Client Certificates20m
Example of Mutual Authentication15m
1 practice exercise
Exam 1.4. Assess PKI Concepts and Certificates Creation/Signing with PKI30m

Reviews

TOP REVIEWS FROM DESIGN AND ANALYZE SECURE NETWORKED SYSTEMS

View all reviews

About the Fundamentals of Computer Network Security Specialization

Fundamentals of Computer Network Security

Frequently Asked Questions

More questions? Visit the Learner Help Center.