When you enroll in this course, you'll also be enrolled in this Specialization.
Learn new concepts from industry experts
Gain a foundational understanding of a subject or tool
Develop job-relevant skills with hands-on projects
Earn a shareable career certificate
There are 5 modules in this course
The course "Cybersecurity Fundamentals" provides a robust foundation in cybersecurity essentials, preparing you to recognize and manage threats in today's digital landscape. Across four comprehensive modules, you'll gain hands-on experience with malware identification, network traffic analysis, internet addressing, and IoT security protocols. In Module 1, explore the relationship between faults, vulnerabilities, and exploits, and learn essential malware identification techniques. Module 2 introduces NetFlow analysis with tools like SiLK and Wireshark, equipping you to collect and interpret network data. Module 3 deepens your understanding of IPv4 and IPv6, BGP routing, and host lookup tools, while Module 4 addresses IoT cybersecurity, where you’ll build a secure IoT framework using Docker and Node-Red.
This course stands out by combining practical exercises with foundational knowledge, ensuring you’re ready to apply what you learn to real-world situations. Whether you’re a beginner or expanding your cybersecurity expertise, completing this course will enhance your ability to protect networks, manage internet space, and secure IoT devices—skills in high demand across the IT sector.
This course covers the identification and analysis of various malware types, vulnerabilities, and exploitation techniques, including the evaluation of antivirus (AV) solutions. Students will utilize NetFlow and the SiLK toolkit to monitor and analyze network traffic for security insights. Additionally, the course includes understanding addressing, BGP lookup, and the security considerations associated with Internet of Things (IoT) devices.
What's included
1 video2 readings
Show info about module content
1 video•Total 4 minutes
Specialization Introduction Video: Information Assurance Analysis•4 minutes
2 readings•Total 10 minutes
Course Overview•5 minutes
Instructor Biography - Prof. Jason Crossland•5 minutes
Malware, Vulnerabilities, Exploitation and AV
Module 2•7 hours to complete
Module details
In this module, we will explore the intricacies of malware, vulnerabilities, and exploits. Students will learn to differentiate between faults, flaws, vulnerabilities, and exploits, utilize major malware catalogs, and understand the significance of signatures and polymorphism in malware identification. The course also covers key malware types and foundational exploitation techniques, including buffer overflows and SQL injections.
Self-Reflective Reading: Cybersecurity - Defense and Detection•40 minutes
3 assignments•Total 90 minutes
Malware, Vulnerabilities, Exploitation and AV•60 minutes
Understanding Malware Catalogs and Identification•15 minutes
Fundamentals of Exploitation Techniques•15 minutes
NetFlow and The SiLK Toolkit
Module 3•9 hours to complete
Module details
This module introduces the fundamental concepts of NetFlow, covering its major components, processes, and analysis principles. Students will learn how NetFlow is derived from network traffic, differentiate it from session data, and utilize tools like SiLK or Wireshark to collect and analyze router and PC traffic effectively.
What's included
4 videos5 readings3 assignments
Show info about module content
4 videos•Total 40 minutes
Overview of Netflow•10 minutes
SiLK Tool Suite•10 minutes
Flow Records•11 minutes
NetFlow Analysis •9 minutes
5 readings•Total 405 minutes
SiLK Benefits per Carnegie Mellon SiLK Links•180 minutes
Reading References•150 minutes
SiLK Helpful Hints and Guidance•25 minutes
Netflow Facts•10 minutes
Self-Reflective Reading: NetFlow and Network Security•40 minutes
3 assignments•Total 90 minutes
NetFlow and The SiLK Toolkit•60 minutes
Understanding NetFlow Components and Traffic Derivation•15 minutes
Analyzing NetFlow Data with SiLK•15 minutes
Addressing, BGP and Lookup
Module 4•6 hours to complete
Module details
This module explores the fundamentals of Internet space management, including the purchasing process, and the differences between IPv4 and IPv6 addressing. It delves into the structure of CIDR blocks, autonomous systems, and BGP routing. You'll also learn to use tools like WHOIS, looking glasses, and RIBS to gather host information.
What's included
6 videos3 readings3 assignments
Show info about module content
6 videos•Total 59 minutes
DHT and P2P•10 minutes
BGP•13 minutes
BGP Source Data•11 minutes
The Basic Routing Problem•8 minutes
Packet Routing•9 minutes
Routing Abuse•9 minutes
3 readings•Total 220 minutes
Reading References•90 minutes
Reading References•90 minutes
Self-Reflective Reading: BGP and Route Hijacking•40 minutes
3 assignments•Total 90 minutes
Addressing, BGP and Lookup•60 minutes
Understanding and Securing User Authentication Threats•15 minutes
Exploring Autonomous Systems and Routing•15 minutes
Internet of Things (IoT)
Module 5•9 hours to complete
Module details
This module explores the cybersecurity landscape of the Internet of Things (IoT), delving into NIST's trust concerns, IoT protocols, and the associated risks. Participants will understand privacy concerns, and risk mitigation strategies, and will gain hands-on experience in building an IoT framework and creating custom Node-Red flows using Docker containers.
What's included
3 readings3 assignments6 plugins
Show info about module content
3 readings•Total 400 minutes
Reading References•180 minutes
Reading References•180 minutes
Self-Reflective Reading: NIST CyberSecurity White Paper on IoT Trust Concerns•40 minutes
3 assignments•Total 90 minutes
Internet of Things (IoT)•60 minutes
IoT Security Fundamentals•15 minutes
Practical IoT Implementation•15 minutes
6 plugins•Total 61 minutes
Video: Lecture 4A•10 minutes
Video: Lecture 4B•9 minutes
Video: Lecture 4C•17 minutes
Video: What is the Internet of Things (IoT) and how can we secure it?•8 minutes
Video: How Internet of Things - IoT & Cyber-Physical Systems Will Shape The 4th Industrial Revolution•10 minutes
Video: Common IoT Cyber Attacks Explained: Technical•7 minutes
Earn a career certificate
Add this credential to your LinkedIn profile, resume, or CV. Share it on social media and in your performance review.
The mission of The Johns Hopkins University is to educate its students and cultivate their capacity for life-long learning, to foster independent and original research, and to bring the benefits of discovery to the world.
When will I have access to the lectures and assignments?
To access the course materials, assignments and to earn a Certificate, you will need to purchase the Certificate experience when you enroll in a course. You can try a Free Trial instead, or apply for Financial Aid. The course may offer 'Full Course, No Certificate' instead. This option lets you see all course materials, submit required assessments, and get a final grade. This also means that you will not be able to purchase a Certificate experience.
What will I get if I subscribe to this Specialization?
When you enroll in the course, you get access to all of the courses in the Specialization, and you earn a certificate when you complete the work. Your electronic Certificate will be added to your Accomplishments page - from there, you can print your Certificate or add it to your LinkedIn profile.
Is financial aid available?
Yes. In select learning programs, you can apply for financial aid or a scholarship if you can’t afford the enrollment fee. If fin aid or scholarship is available for your learning program selection, you’ll find a link to apply on the description page.