When you enroll in this course, you'll also be enrolled in this Specialization.
Learn new concepts from industry experts
Gain a foundational understanding of a subject or tool
Develop job-relevant skills with hands-on projects
Earn a shareable career certificate
There are 5 modules in this course
Computer attacks and data breaches are inevitable. It seems like every day a data breach occurs and the victims of the data breach suffer. Their information is stolen or posted online. The company’s or businesses who had the breach go on, learn a little from the attack, and just give credit monitoring out as if nothing happened. What if you could help prevent a data breach in your organization? This is the third course in the Practical Computer Security specialization. This course looks at detection and mitigation of threats and attack vectors and discusses how to use tools and principles to protect information. By the end of the course you should be able to make suggestions on what type of detection and mitigation strategy is right for your systems or business given the known threats and attack vectors. You should be able to discuss what features you want in a firewall, or how cash registers or sensitive data systems should be secured. The project at the end of the course will allow you to apply what you have learned to argue what type of detection and mitigation strategies should have been employed by companies and businesses that have suffered a data breach.
Welcome! This week we'll explore firewalls as they are usually the first line of defense against a threat or attack.
Get help and meet other learners. Join your Community!•5 minutes
Lecture Slides•10 minutes
2 assignments•Total 60 minutes
Practice Quiz - Week 1•30 minutes
Week 1 - Firewalls - the gatekeeper•30 minutes
1 discussion prompt•Total 10 minutes
Stop blaming the firewall!•10 minutes
Intrusion Detection and Prevention
Module 2•2 hours to complete
Module details
This module will cover intrusion detection and prevention, which is one of the most essential concepts in looking at how threats and attacks are detected and mitigated.
Week 2 - Intrusion Detection and Prevention•30 minutes
1 discussion prompt•Total 10 minutes
Intrusion Detection and Prevention•10 minutes
Detection and Prevention tools
Module 3•2 hours to complete
Module details
This module covers intrusion detection and prevention tools used for both networks and systems. There will be demos of the tools so that you can understand how they might protect your network or systems better.
The University of Colorado is a recognized leader in higher education on the national and global stage. We collaborate to meet the diverse needs of our students and communities. We promote innovation, encourage discovery and support the extension of knowledge in ways unique to the state of Colorado and beyond.
"To be able to take courses at my own pace and rhythm has been an amazing experience. I can learn whenever it fits my schedule and mood."
Jennifer J.
Learner since 2020
"I directly applied the concepts and skills I learned from my courses to an exciting new project at work."
Larry W.
Learner since 2021
"When I need courses on topics that my university doesn't offer, Coursera is one of the best places to go."
Chaitanya A.
"Learning isn't just about being better at your job: it's so much more than that. Coursera allows me to learn without limits."
Learner reviews
4.7
459 reviews
5 stars
78.86%
4 stars
18.08%
3 stars
1.96%
2 stars
0.43%
1 star
0.65%
Showing 3 of 459
J
J
5·
Reviewed on Feb 9, 2021
Concepts were very simplified and concise. Examples given in the course were past incidents the faculty had experienced and it helped me translate the theory into work.
S
SH
5·
Reviewed on Jan 7, 2019
Best course to take. Thank you for helping me to improve my understanding about the Cyber Security
M
MK
5·
Reviewed on Oct 30, 2020
exceptional and fantastic way to teach. makes it east to learn a lot w/o any issues.
When will I have access to the lectures and assignments?
To access the course materials, assignments and to earn a Certificate, you will need to purchase the Certificate experience when you enroll in a course. You can try a Free Trial instead, or apply for Financial Aid. The course may offer 'Full Course, No Certificate' instead. This option lets you see all course materials, submit required assessments, and get a final grade. This also means that you will not be able to purchase a Certificate experience.
What will I get if I subscribe to this Specialization?
When you enroll in the course, you get access to all of the courses in the Specialization, and you earn a certificate when you complete the work. Your electronic Certificate will be added to your Accomplishments page - from there, you can print your Certificate or add it to your LinkedIn profile.
Is financial aid available?
Yes. In select learning programs, you can apply for financial aid or a scholarship if you can’t afford the enrollment fee. If fin aid or scholarship is available for your learning program selection, you’ll find a link to apply on the description page.