I’ve heard this before – “I’m not sure my computer security practices are working”. I reply “Have you tested them?” This course is the fourth and final course in the Practical Computer Security specialization. In this course, you’ll learn how to proactively test what you have put in place to protect your data. In the first week you’ll be able to discuss the basics of deterrents and how to “trick” attackers into believing they’ve hit a goldmine of data away from your real systems. In week 2, you’ll be able to understand and discuss the steps of penetration testing methodology. In week 3, you will be able to understand and apply what you have learned on your own systems to test whether your systems are secure or not. In week 4, we’ll discuss planning for your own methodology that you can apply to your own systems. And finally in week 5, we’ll finish up with a project that will allow you to test your skills in a safe environment.
About this Course
- 5 stars79.23%
- 4 stars13.98%
- 3 stars3.38%
- 2 stars1.69%
- 1 star1.69%
TOP REVIEWS FROM PROACTIVE COMPUTER SECURITY
Very informative and instructive course. It's also the most challenging part of the course.
Detailed and informative, I found the course to be well structured.
This course was an excellent introduction and overview of what security professionals face. I am non-technical and had only limited difficulty with a small portion of the materials.
It took a bit more than I expected to get to the end but it was worth the effort
About the Cybersecurity for Business Specialization
Frequently Asked Questions
When will I have access to the lectures and assignments?
What will I get if I subscribe to this Specialization?
Is financial aid available?
More questions? Visit the Learner Help Center.