About this Course

41,266 recent views

Learner Career Outcomes

75%

got a tangible career benefit from this course

17%

got a pay increase or promotion

Shareable Certificate

Earn a Certificate upon completion

100% online

Start instantly and learn at your own schedule.

Flexible deadlines

Reset deadlines in accordance to your schedule.

Intermediate Level

Approx. 14 hours to complete

English

Subtitles: English

Learner Career Outcomes

75%

got a tangible career benefit from this course

17%

got a pay increase or promotion

Shareable Certificate

Earn a Certificate upon completion

100% online

Start instantly and learn at your own schedule.

Flexible deadlines

Reset deadlines in accordance to your schedule.

Intermediate Level

Approx. 14 hours to complete

English

Subtitles: English

Offered by

New York University logo

New York University

Syllabus - What you will learn from this course

Content RatingThumbs Up97%(1,235 ratings)Info
Week
1

Week 1

5 hours to complete

Basic Network Security

5 hours to complete
13 videos (Total 71 min), 5 readings, 1 quiz
13 videos
Assignments and Reading2m
Security Through Obscurity4m
TCP/IP Evolution and Security6m
TCP/IP Overview8m
IP Spoofing5m
TCP Sequence Number Attack5m
Packet Flooding5m
Packet Sniffing5m
SYN Packets for Access Control5m
Definition of a Firewall5m
Firewall: Stateful versus Stateless5m
Interview: John Viega8m
5 readings
Required: “Network Firewalls,” Steve Bellovin and Bill Cheswick30m
Required: “Introduction to TCP/IP Network Attacks,” Guang Yang45m
Video: “Hacking DNS,” Eli the Computer Guy46m
Suggested: Introduction to Cyber Security, Edward Amoroso and Matthew Amoroso, (Ch. 17 - 18)30m
Suggested: TCP/IP Illustrated Volume 1 (2nd Edition), Kevin Fall and W. Richard Stevens, (Ch. 17 – 18)30m
1 practice exercise
Module 1 Quiz20m
Week
2

Week 2

3 hours to complete

More Advanced Network Security Technologies

3 hours to complete
12 videos (Total 65 min), 4 readings, 1 quiz
12 videos
Packet Filtering7m
Sample Packet Filtering and Reference Architecture5m
Default Firewall Block4m
Firewall Rules to Allow Outbound Web Browsing4m
Firewall Rules to Allow Telnet and Other TCP Services3m
Establishing Corporate Policy Rules4m
FTP Protocol6m
Firewall Rules for FTP3m
Application Proxy Filtering6m
Forward and Reverse Proxies4m
Interview: Roger Piqueras Jover11m
4 readings
Required: “Anomaly-based Network Intrusion Detection: Techniques, Systems, and Challenges.”20m
Required: “Intrusion Detection via Static Analysis,” Wagner and Dean25m
Video: “How Does Intrusion Prevention Systems Work,” 2013 - SourceFire6m
Suggested: Introduction to Cyber Security, Edward Amoroso and Matthew Amoroso, (Chapters 19 - 20)30m
1 practice exercise
Module 2 Quiz20m
Week
3

Week 3

3 hours to complete

Network Security Architectures

3 hours to complete
11 videos (Total 68 min), 4 readings, 1 quiz
11 videos
Firewall Architectures (Part 1)6m
Firewall Architectures (Part 2)6m
Management by Exception5m
System Auditing6m
Basics of Intrusion Detection7m
Signature Versus Behavioral Detection5m
IDS Versus IPS6m
Design of SIEM5m
Design of a SOC6m
Interview: Dino Dai Zovi9m
4 readings
Required: “An Evening with Berferd,” Bill Cheswick20m
Required: “IDES Model,” Dorothy Denning30m
Video: “DEFCAMP 2015 – Building a Security Operations Center,”32m
Suggested: Introduction to Cyber Security, Edward Amoroso and Matthew Amoroso, (Ch. 21 - 22)30m
1 practice exercise
Module 3 Quiz20m
Week
4

Week 4

4 hours to complete

Enterprise Network Security

4 hours to complete
12 videos (Total 70 min), 5 readings, 2 quizzes
12 videos
Practical Limitations of Perimeter7m
APT Schema Through Perimeter Holes6m
Third Party Security5m
Target APT Attack5m
Large Government Agency Attack5m
Layer 3 DDOS Protection6m
Layer 7 Application Level DDOS Risk3m
Large Financial Website DDOS Attacks4m
Network Security Industry Overview2m
Interview: Ray Cheng - Pt. 113m
Interview: Ray Cheng - Pt. 26m
5 readings
Required: “From the Enterprise Perimeter to Mobility Enabled Cloud,” Ed Amoroso, IEEE25m
Required: “A Study of Advanced Persistent Threats,” Chen, Desmet, and Huygens30m
“Implementing Zero Trust,” Ed Amoroso, 201830m
Suggested: Introduction to Cyber Security, Edward Amoroso and Matthew Amoroso, (Ch. 23 - 24)30m
Quiz Directions5m
2 practice exercises
Module 4 Quiz20m
Select the Best Migration Choice:12m

About the Introduction to Cyber Security Specialization

Introduction to Cyber Security was designed to help learners develop a deeper understanding of modern information and system protection technology and methods. The learning outcome is simple: We hope learners will develop a lifelong passion and appreciation for cyber security, which we are certain will help in future endeavors. Students, developers, managers, engineers, and even private citizens will benefit from this learning experience. Special customized interviews with industry partners were included to help connect the cyber security concepts to live business experiences....
Introduction to Cyber Security

Frequently Asked Questions

  • Once you enroll for a Certificate, you’ll have access to all videos, quizzes, and programming assignments (if applicable). Peer review assignments can only be submitted and reviewed once your session has begun. If you choose to explore the course without purchasing, you may not be able to access certain assignments.

  • When you enroll in the course, you get access to all of the courses in the Specialization, and you earn a certificate when you complete the work. Your electronic Certificate will be added to your Accomplishments page - from there, you can print your Certificate or add it to your LinkedIn profile. If you only want to read and view the course content, you can audit the course for free.

  • If you subscribed, you get a 7-day free trial during which you can cancel at no penalty. After that, we don’t give refunds, but you can cancel your subscription at any time. See our full refund policy.

  • Yes, Coursera provides financial aid to learners who cannot afford the fee. Apply for it by clicking on the Financial Aid link beneath the "Enroll" button on the left. You'll be prompted to complete an application and will be notified if you are approved. You'll need to complete this step for each course in the Specialization, including the Capstone Project. Learn more.

  • This Course doesn't carry university credit, but some universities may choose to accept Course Certificates for credit. Check with your institution to learn more. Online Degrees and Mastertrack™ Certificates on Coursera provide the opportunity to earn university credit.

More questions? Visit the Learner Help Center.