When you enroll in this course, you'll also be enrolled in this Specialization.
Learn new concepts from industry experts
Gain a foundational understanding of a subject or tool
Develop job-relevant skills with hands-on projects
Earn a shareable career certificate
There are 4 modules in this course
This course introduces real-time cyber security techniques and methods in the context of the TCP/IP protocol suites. Explanation of some basic TCP/IP security hacks is used to introduce the need for network security solutions such as stateless and stateful firewalls. Learners will be introduced to the techniques used to design and configure firewall solutions such as packet filters and proxies to protect enterprise assets.
Perimeter solutions such as firewalls and intrusion prevention systems are shown to have significant drawbacks in common enterprise environments. The result of such weakness is shown to often exist as advanced persistent threats (APTs) from nation-state actors. Such attacks, as well as DDOS and third-party attacks, are shown to have potential solutions for modern enterprise.
This module introduces the basics of TCP/IP for security, including firewall design and use.
What's included
13 videos5 readings1 assignment
Show info about module content
13 videos•Total 71 minutes
Introduction: What You Will Learn from This Course on Cyber Security•2 minutes
Assignments and Reading•2 minutes
Security Through Obscurity•5 minutes
TCP/IP Evolution and Security•6 minutes
TCP/IP Overview•8 minutes
IP Spoofing•6 minutes
TCP Sequence Number Attack•6 minutes
Packet Flooding•5 minutes
Packet Sniffing•6 minutes
SYN Packets for Access Control•5 minutes
Definition of a Firewall•6 minutes
Firewall: Stateful versus Stateless•5 minutes
Interview: John Viega•9 minutes
5 readings•Total 181 minutes
Required: “Network Firewalls,” Steve Bellovin and Bill Cheswick•30 minutes
Required: “Introduction to TCP/IP Network Attacks,” Guang Yang•45 minutes
Video: “Hacking DNS,” Eli the Computer Guy•46 minutes
Suggested: Introduction to Cyber Security, Edward Amoroso and Matthew Amoroso, (Ch. 17 - 18)•30 minutes
Suggested: TCP/IP Illustrated Volume 1 (2nd Edition), Kevin Fall and W. Richard Stevens, (Ch. 17 – 18)•30 minutes
1 assignment•Total 30 minutes
Module 1 Quiz•30 minutes
More Advanced Network Security Technologies
Module 2•3 hours to complete
Module details
This module introduces packet filters, firewall rule sets, proxies, and additional network security methods.
What's included
12 videos4 readings1 assignment
Show info about module content
12 videos•Total 65 minutes
Assignments and Reading•3 minutes
Packet Filtering•7 minutes
Sample Packet Filtering and Reference Architecture•6 minutes
Default Firewall Block•5 minutes
Firewall Rules to Allow Outbound Web Browsing•5 minutes
Firewall Rules to Allow Telnet and Other TCP Services•3 minutes
Establishing Corporate Policy Rules•4 minutes
FTP Protocol•6 minutes
Firewall Rules for FTP•4 minutes
Application Proxy Filtering•6 minutes
Forward and Reverse Proxies•5 minutes
Interview: Roger Piqueras Jover•11 minutes
4 readings•Total 81 minutes
Required: “Anomaly-based Network Intrusion Detection: Techniques, Systems, and Challenges.”•20 minutes
Required: “Intrusion Detection via Static Analysis,” Wagner and Dean•25 minutes
Video: “How Does Intrusion Prevention Systems Work,” 2013 - SourceFire•6 minutes
Suggested: Introduction to Cyber Security, Edward Amoroso and Matthew Amoroso, (Chapters 19 - 20)•30 minutes
1 assignment•Total 30 minutes
Module 2 Quiz•30 minutes
Network Security Architectures
Module 3•4 hours to complete
Module details
This module introduces the foundations firewall architectures, intrusion detection, and SOC design.
What's included
11 videos4 readings1 assignment
Show info about module content
11 videos•Total 68 minutes
Assignments and Readings•3 minutes
Firewall Architectures (Part 1)•6 minutes
Firewall Architectures (Part 2)•6 minutes
Management by Exception•6 minutes
System Auditing•7 minutes
Basics of Intrusion Detection•8 minutes
Signature Versus Behavioral Detection•6 minutes
IDS Versus IPS•7 minutes
Design of SIEM•5 minutes
Design of a SOC•6 minutes
Interview: Dino Dai Zovi•10 minutes
4 readings•Total 112 minutes
Required: “An Evening with Berferd,” Bill Cheswick•20 minutes
New York University is a leading global institution for scholarship, teaching, and research. Based in New York City with campuses and sites in 14 additional major cities across the world, NYU embraces diversity among faculty, staff and students to ensure the highest caliber, most inclusive educational experience.
"To be able to take courses at my own pace and rhythm has been an amazing experience. I can learn whenever it fits my schedule and mood."
Jennifer J.
Learner since 2020
"I directly applied the concepts and skills I learned from my courses to an exciting new project at work."
Larry W.
Learner since 2021
"When I need courses on topics that my university doesn't offer, Coursera is one of the best places to go."
Chaitanya A.
"Learning isn't just about being better at your job: it's so much more than that. Coursera allows me to learn without limits."
Learner reviews
4.7
663 reviews
5 stars
78.88%
4 stars
18.40%
3 stars
1.96%
2 stars
0%
1 star
0.75%
Showing 3 of 663
S
SM
5·
Reviewed on May 23, 2020
Explained in simple language, which make the concepts easy to understandGood additional resources & case studies to make foundation strong
S
SP
5·
Reviewed on Apr 17, 2021
Technical terms described in a meaningful ways and examples were very effective to grasp the impact and importance of cybersecurity.
A
AJ
5·
Reviewed on May 16, 2022
I am not an engineer but this course is interesting. I have learned so much about cyber security. I am about to start the last course in this progaram.
When will I have access to the lectures and assignments?
To access the course materials, assignments and to earn a Certificate, you will need to purchase the Certificate experience when you enroll in a course. You can try a Free Trial instead, or apply for Financial Aid. The course may offer 'Full Course, No Certificate' instead. This option lets you see all course materials, submit required assessments, and get a final grade. This also means that you will not be able to purchase a Certificate experience.
What will I get if I subscribe to this Specialization?
When you enroll in the course, you get access to all of the courses in the Specialization, and you earn a certificate when you complete the work. Your electronic Certificate will be added to your Accomplishments page - from there, you can print your Certificate or add it to your LinkedIn profile.
Is financial aid available?
Yes. In select learning programs, you can apply for financial aid or a scholarship if you can’t afford the enrollment fee. If fin aid or scholarship is available for your learning program selection, you’ll find a link to apply on the description page.