About this Course

12,878 recent views

Learner Career Outcomes

56%

started a new career after completing these courses

50%

got a tangible career benefit from this course

20%

got a pay increase or promotion
Shareable Certificate
Earn a Certificate upon completion
100% online
Start instantly and learn at your own schedule.
Flexible deadlines
Reset deadlines in accordance to your schedule.
Intermediate Level
Approx. 15 hours to complete
English

Learner Career Outcomes

56%

started a new career after completing these courses

50%

got a tangible career benefit from this course

20%

got a pay increase or promotion
Shareable Certificate
Earn a Certificate upon completion
100% online
Start instantly and learn at your own schedule.
Flexible deadlines
Reset deadlines in accordance to your schedule.
Intermediate Level
Approx. 15 hours to complete
English

Offered by

Placeholder

New York University

Syllabus - What you will learn from this course

Week
1

Week 1

4 hours to complete

Security Awareness, Compliance, Assessments, and Risk

4 hours to complete
12 videos (Total 66 min), 4 readings, 1 quiz
12 videos
Assignments and Reading2m
Social Engineering5m
Phishing7m
Security Awareness4m
Using Video for Security Awareness1m
Security Assessment and Audit4m
What is GRC?9m
NIST Framework Overview4m
PCI-DSS Framework Overview5m
Challenges of Compliance versus Security5m
Welcome Roger Thornton (Part 1): CTO, AlienVault12m
4 readings
Required: “Framework for Improving Critical Infrastructure Cybersecurity,” Version 1.0, NIST, Feb 12, 2014.1h
Video: “Addressing the Challenges of Complying with the Payment Card Industry Data Security Standard,” HALOCK Security Labs – Introduction to PCI Compliance11m
Video: “Closing Keynote – The Past, Present, and Future of Integrated GRC,” French Caldwell, MetricStream33m
Suggested: Introduction to Cyber Security, Edward Amoroso and Matthew Amoroso, eBook available online (Chapters 25 - 26)1h
1 practice exercise
Module 1 Quiz30m
Week
2

Week 2

3 hours to complete

Hybrid Cloud Security

3 hours to complete
10 videos (Total 56 min), 2 readings, 1 quiz
10 videos
Enterprise Shift to Hybrid Cloud6m
Workload Micro-Segmentation6m
Defense in Depth through Micro-Segmentation4m
Cloud Access Security Brokers4m
Advanced Hybrid Cloud Security Architecture (Part 1)6m
Advanced Hybrid Cloud Security Architecture (Part 2)4m
Advanced Hybrid Cloud Security Architecture (Part 3)3m
Security of Isolated Servers (Outside Perimeter)4m
Welcome John Popolizio: Founder, Riverdale Group13m
2 readings
Required: “Practical Methods for Securing the Cloud,” IEEE, Ed Amoroso, 201420m
Suggested: Introduction to Cyber Security, Edward Amoroso and Matthew Amoroso, eBook available online (Chapters 27 - 28)1h
1 practice exercise
Module 2 Quiz30m
Week
3

Week 3

4 hours to complete

Blockchain, Anonymity, and Critical Infrastructure Protection

4 hours to complete
10 videos (Total 77 min), 4 readings, 1 quiz
10 videos
Hashing Algorithms7m
Blockchain - Part 16m
Blockchain - Part 29m
Cyber Attribution7m
Onion Routing and Tor8m
Chaum Binding Algorithm9m
Critical Infrastructure - Part 1 - Requirements7m
Critical Infrastructure - Part 2 - Protection Methods8m
Welcome Roger Thornton (Part 2): CTO, AlienVault9m
4 readings
Required: “Bitcoin: A Peer-to-Peer Electronic Cash System,” S. Nakamoto20m
Required: “Common Threats and Vulnerabilities of Critical Infrastructures,” Robles, Choi, Cho, Kim, Park, and Lee, Dongseo University, Korea. International Journal of Control and Automation.15m
Video: “HDIAC Critical Infrastructure Protection Webinar,” Benjamin Ruddell, Arizona State University, 201542m
Suggested: Introduction to Cyber Security, Edward Amoroso and Matthew Amoroso, eBook available online (Chapters 29 - 30)1h
1 practice exercise
Module 3 Quiz30m
Week
4

Week 4

4 hours to complete

Mobility Security and Deception

4 hours to complete
9 videos (Total 47 min), 5 readings, 2 quizzes
9 videos
Mobility Security9m
IMSI Catching5m
IoT Security6m
IoT Botnets3m
Using Deception and Honey Pots for Security5m
Welcome Elena Kvochko, Cyber Security Expert7m
Advice on Careers in Cyber Security5m
How to Continue a Learning Plan in Cyber Security2m
5 readings
Required: “Anonymous Connections and Onion Routing,” Michael Reed, Paul Syverson, and David Goldschlag, onion-router.net.25m
Required: “Cyber Security Deception,” Mohammed Almeshekah and Eugene Spafford, Springer.com50m
Video: “Kevin Mahaffey – Lookout – Mobile Security,”22m
Project Description10m
Additional Self-Study10m
2 practice exercises
Module 4 Quiz30m
Multiple Choice Questions30m

Reviews

TOP REVIEWS FROM ENTERPRISE AND INFRASTRUCTURE SECURITY

View all reviews

About the Introduction to Cyber Security Specialization

Introduction to Cyber Security

Frequently Asked Questions

More questions? Visit the Learner Help Center.