When you enroll in this course, you'll also be enrolled in this Specialization.
Learn new concepts from industry experts
Gain a foundational understanding of a subject or tool
Develop job-relevant skills with hands-on projects
Earn a shareable career certificate
There are 4 modules in this course
This course introduces a series of advanced and current topics in cyber security, many of which are especially relevant in modern enterprise and infrastructure settings. The basics of enterprise compliance frameworks are provided with introduction to NIST and PCI. Hybrid cloud architectures are shown to provide an opportunity to fix many of the security weaknesses in modern perimeter local area networks.
Emerging security issues in blockchain, blinding algorithms, Internet of Things (IoT), and critical infrastructure protection are also described for learners in the context of cyber risk. Mobile security and cloud security hyper-resilience approaches are also introduced. The course completes with some practical advice for learners on how to plan careers in cyber security.
This module includes an introduction to many practical aspects of modern enterprise security including awareness, compliance, assessments, and risk management.
What's included
12 videos4 readings1 assignment
Show info about module content
12 videos•Total 66 minutes
Introduction: What You Will Learn from This Course on Cyber Security•2 minutes
Assignments and Reading•3 minutes
Social Engineering•6 minutes
Phishing•8 minutes
Security Awareness•5 minutes
Using Video for Security Awareness•2 minutes
Security Assessment and Audit•4 minutes
What is GRC?•10 minutes
NIST Framework Overview•5 minutes
PCI-DSS Framework Overview•5 minutes
Challenges of Compliance versus Security•5 minutes
Welcome Roger Thornton (Part 1): CTO, AlienVault•13 minutes
4 readings•Total 164 minutes
Required: “Framework for Improving Critical Infrastructure Cybersecurity,” Version 1.0, NIST, Feb 12, 2014.•60 minutes
Video: “Addressing the Challenges of Complying with the Payment Card Industry Data Security Standard,” HALOCK Security Labs – Introduction to PCI Compliance•11 minutes
Video: “Closing Keynote – The Past, Present, and Future of Integrated GRC,” French Caldwell, MetricStream•33 minutes
Suggested: Introduction to Cyber Security, Edward Amoroso and Matthew Amoroso, eBook available online (Chapters 25 - 26)•60 minutes
1 assignment•Total 30 minutes
Module 1 Quiz•30 minutes
Hybrid Cloud Security
Module 2•3 hours to complete
Module details
This module provides students with an introduction to the cyber security implications of the enterprise shifting to a hybrid cloud computing model.
What's included
10 videos2 readings1 assignment
Show info about module content
10 videos•Total 56 minutes
Assignments and Reading•1 minute
Enterprise Shift to Hybrid Cloud•7 minutes
Workload Micro-Segmentation•6 minutes
Defense in Depth through Micro-Segmentation•5 minutes
Security of Isolated Servers (Outside Perimeter)•4 minutes
Welcome John Popolizio: Founder, Riverdale Group•14 minutes
2 readings•Total 80 minutes
Required: “Practical Methods for Securing the Cloud,” IEEE, Ed Amoroso, 2014•20 minutes
Suggested: Introduction to Cyber Security, Edward Amoroso and Matthew Amoroso, eBook available online (Chapters 27 - 28)•60 minutes
1 assignment•Total 30 minutes
Module 2 Quiz•30 minutes
Blockchain, Anonymity, and Critical Infrastructure Protection
Module 3•4 hours to complete
Module details
This module introduces several advanced topics in cyber security ranging from blockchain usage, user anonymity, and critical infrastructure protection.
What's included
10 videos4 readings1 assignment
Show info about module content
10 videos•Total 77 minutes
Assignments and Reading•2 minutes
Hashing Algorithms•8 minutes
Blockchain - Part 1•6 minutes
Blockchain - Part 2•10 minutes
Cyber Attribution•8 minutes
Onion Routing and Tor•8 minutes
Chaum Binding Algorithm•10 minutes
Critical Infrastructure - Part 1 - Requirements•7 minutes
Critical Infrastructure - Part 2 - Protection Methods•9 minutes
Welcome Roger Thornton (Part 2): CTO, AlienVault•9 minutes
4 readings•Total 137 minutes
Required: “Bitcoin: A Peer-to-Peer Electronic Cash System,” S. Nakamoto•20 minutes
Required: “Common Threats and Vulnerabilities of Critical Infrastructures,” Robles, Choi, Cho, Kim, Park, and Lee, Dongseo University, Korea. International Journal of Control and Automation.•15 minutes
Video: “HDIAC Critical Infrastructure Protection Webinar,” Benjamin Ruddell, Arizona State University, 2015•42 minutes
Suggested: Introduction to Cyber Security, Edward Amoroso and Matthew Amoroso, eBook available online (Chapters 29 - 30)•60 minutes
1 assignment•Total 30 minutes
Module 3 Quiz•30 minutes
Mobility Security and Deception
Module 4•4 hours to complete
Module details
This module introduces several advanced topics in cyber security including mobility security and deception – and includes suggestions on career planning for future cyber professionals.
What's included
9 videos5 readings2 assignments
Show info about module content
9 videos•Total 47 minutes
Assignments and Reading•2 minutes
Mobility Security•9 minutes
IMSI Catching•5 minutes
IoT Security•7 minutes
IoT Botnets•3 minutes
Using Deception and Honey Pots for Security•5 minutes
Welcome Elena Kvochko, Cyber Security Expert•8 minutes
Advice on Careers in Cyber Security•5 minutes
How to Continue a Learning Plan in Cyber Security•3 minutes
5 readings•Total 117 minutes
Required: “Anonymous Connections and Onion Routing,” Michael Reed, Paul Syverson, and David Goldschlag, onion-router.net.•25 minutes
Required: “Cyber Security Deception,” Mohammed Almeshekah and Eugene Spafford, Springer.com•50 minutes
Video: “Kevin Mahaffey – Lookout – Mobile Security,”•22 minutes
Project Description•10 minutes
Additional Self-Study•10 minutes
2 assignments•Total 60 minutes
Module 4 Quiz•30 minutes
Multiple Choice Questions•30 minutes
Earn a career certificate
Add this credential to your LinkedIn profile, resume, or CV. Share it on social media and in your performance review.
Instructor
Instructor ratings
Instructor ratings
We asked all learners to give feedback on our instructors based on the quality of their teaching style.
New York University is a leading global institution for scholarship, teaching, and research. Based in New York City with campuses and sites in 14 additional major cities across the world, NYU embraces diversity among faculty, staff and students to ensure the highest caliber, most inclusive educational experience.
"To be able to take courses at my own pace and rhythm has been an amazing experience. I can learn whenever it fits my schedule and mood."
Jennifer J.
Learner since 2020
"I directly applied the concepts and skills I learned from my courses to an exciting new project at work."
Larry W.
Learner since 2021
"When I need courses on topics that my university doesn't offer, Coursera is one of the best places to go."
Chaitanya A.
"Learning isn't just about being better at your job: it's so much more than that. Coursera allows me to learn without limits."
Learner reviews
4.7
683 reviews
5 stars
77.15%
4 stars
19.03%
3 stars
2.48%
2 stars
0.73%
1 star
0.58%
Showing 3 of 683
A
AR
4·
Reviewed on Nov 22, 2021
Good theoretical course for beginners. Needs a bit improvement in the assessment questions and language.
T
TS
5·
Reviewed on Mar 7, 2020
Excellent, highly recommended. A good overview of enterprise and infrastructure security.
D
DM
5·
Reviewed on Jul 5, 2020
Great course to provide a framework for students to understand Enterprise and Infrastructure security that is relevant in this modern world. I think the topics on cloud was the most useful.
When will I have access to the lectures and assignments?
To access the course materials, assignments and to earn a Certificate, you will need to purchase the Certificate experience when you enroll in a course. You can try a Free Trial instead, or apply for Financial Aid. The course may offer 'Full Course, No Certificate' instead. This option lets you see all course materials, submit required assessments, and get a final grade. This also means that you will not be able to purchase a Certificate experience.
What will I get if I subscribe to this Specialization?
When you enroll in the course, you get access to all of the courses in the Specialization, and you earn a certificate when you complete the work. Your electronic Certificate will be added to your Accomplishments page - from there, you can print your Certificate or add it to your LinkedIn profile.
Is financial aid available?
Yes. In select learning programs, you can apply for financial aid or a scholarship if you can’t afford the enrollment fee. If fin aid or scholarship is available for your learning program selection, you’ll find a link to apply on the description page.