This course introduces real-time cyber security techniques and methods in the context of the TCP/IP protocol suites. Explanation of some basic TCP/IP security hacks is used to introduce the need for network security solutions such as stateless and stateful firewalls. Learners will be introduced to the techniques used to design and configure firewall solutions such as packet filters and proxies to protect enterprise assets.
This course is part of the Introduction to Cyber Security Specialization
Offered By
About this Course
Could your company benefit from training employees on in-demand skills?
Try Coursera for BusinessCould your company benefit from training employees on in-demand skills?
Try Coursera for BusinessOffered by
Syllabus - What you will learn from this course
Basic Network Security
More Advanced Network Security Technologies
Network Security Architectures
Enterprise Network Security
Reviews
- 5 stars78.54%
- 4 stars19.03%
- 3 stars1.73%
- 1 star0.69%
TOP REVIEWS FROM REAL-TIME CYBER THREAT DETECTION AND MITIGATION
I love the stories and method of explaining provided by Dr. Amoroso, really great and learned a ton of stuff!
Very good course to start with for Real-Time Cyber Threat Detection and Mitigation.
This incredible course makes me learn a lot about all the threat we deal in the recent times. The teacher and videos are really enjoyable and very detailed.
I used this course a refresh for established cyber skills, its been a welcome change to have such an enthusiastic lecturer and revisit some of the cornerstones of cyber.
About the Introduction to Cyber Security Specialization

Frequently Asked Questions
When will I have access to the lectures and assignments?
What will I get if I subscribe to this Specialization?
Is financial aid available?
More questions? Visit the Learner Help Center.