Digital Shield: Cybersecurity for Data and Systems Protection" is a course designed to provide a solid introduction to the protection of sensitive data and the infrastructure supporting various information systems.

Digital Shield: Cybersecurity for Data and System Protection

Digital Shield: Cybersecurity for Data and System Protection

Instructor: Daniel Zeldis
Access provided by Vishwakarma Intitutes
Details to know

Add to your LinkedIn profile
100 assignments
See how employees at top companies are mastering in-demand skills

There are 7 modules in this course
What's included
3 readings1 discussion prompt
3 readings• Total 8 minutes
- Welcome• 4 minutes
- Políticas y lineamientos de calificación• 2 minutes
- Políticas de Coursera• 2 minutes
1 discussion prompt• Total 3 minutes
- Bienvenida Presentación• 3 minutes
What's included
11 videos10 readings20 assignments10 discussion prompts
11 videos• Total 39 minutes
- Introduction• 2 minutes
- Basic Concepts and Definitions• 4 minutes
- Vulnerabilities and Risks• 4 minutes
- Video• 3 minutes
- Video• 4 minutes
- Video• 4 minutes
- Video• 3 minutes
- Video• 4 minutes
- Video• 4 minutes
- Video• 4 minutes
- Video• 3 minutes
10 readings• Total 71 minutes
- Basic Concepts and Definitions• 6 minutes
- Vulnerabilities and Risks• 8 minutes
- Threats and Models• 5 minutes
- Threat Model Frameworks• 8 minutes
- Defense in Depth• 6 minutes
- Security Controls• 5 minutes
- Maturity Models• 6 minutes
- Security Roles in the Organization• 10 minutes
- Strategies & Metrics• 8 minutes
- Information Security Governance• 9 minutes
20 assignments• Total 109 minutes
- Activity: Basic Concepts and Definitions• 6 minutes
- Activity: Vulnerabilities and Risks• 10 minutes
- Activity: Threats and Models• 5 minutes
- Activity: Threat Model Frameworks• 6 minutes
- Activity: Defense in Depth• 3 minutes
- Activity: Security Controls• 5 minutes
- Activity: Maturity Models• 5 minutes
- Activity: Security Roles in the Organization• 7 minutes
- Activity: Strategies & Metrics• 5 minutes
- Activity: Information Security Governance• 4 minutes
- Review 1: Basic Concepts and Definitions• 5 minutes
- Review 2: Vulnerabilities and Risks• 6 minutes
- Review 3: Threats and Models• 7 minutes
- Review 4: Threat Model Frameworks• 5 minutes
- Review 5: Defense in Depth• 5 minutes
- Review 6: Security Controls• 5 minutes
- Review 7: Maturity Models• 5 minutes
- Review 8: Security Roles in the Organization• 5 minutes
- Review 9: Strategies & Metrics• 5 minutes
- Review 10: Information Security Governance• 5 minutes
10 discussion prompts• Total 30 minutes
- Discussion: Basic Concepts and Definitions• 3 minutes
- Discussion: Vulnerabilities and Risks• 3 minutes
- Discussion: Threats and Models• 3 minutes
- Discussion: Threat Model Frameworks• 3 minutes
- Discussion: Defense in Depth • 3 minutes
- Discussion: Security Controls• 3 minutes
- Discussion: Maturity Models• 3 minutes
- Discussion: Security Roles in the Organization• 3 minutes
- Discussion: Strategies & Metrics• 3 minutes
- Discussion: Information Security Governance• 3 minutes
What's included
10 videos10 readings20 assignments10 discussion prompts
10 videos• Total 29 minutes
- Introduction to Malware• 3 minutes
- Malware Infection• 2 minutes
- Types of Malwares• 4 minutes
- Ransomware• 3 minutes
- Malware Detection Systems • 3 minutes
- SandBox Controls• 2 minutes
- Origin of Malware in Software• 3 minutes
- Best Practices in Software Development• 4 minutes
- SAST Static Analysis • 2 minutes
- DAST Dynamic Analysis • 2 minutes
10 readings• Total 72 minutes
- Introduction to Malware• 5 minutes
- Malware Infection• 6 minutes
- Types of Malwares• 10 minutes
- Ransomware• 7 minutes
- Malware Detection Systems • 10 minutes
- SandBox Controls• 8 minutes
- Origin of Malware in Software• 6 minutes
- Best Practices in Software Development• 5 minutes
- SAST Static Analysis • 8 minutes
- DAST Dynamic Analysis • 7 minutes
20 assignments• Total 96 minutes
- Activity: Introduction to Malware• 5 minutes
- Activity: Malware Infection• 5 minutes
- Activity: Types of Malwares• 5 minutes
- Activity: Ransomware• 5 minutes
- Activity: Malware Detection Systems• 4 minutes
- Activity: SandBox Controls• 5 minutes
- Activity: Origin of Malware in Software• 5 minutes
- Activity: Best Practices in Software Development• 5 minutes
- Activity: SAST Static Analysis• 5 minutes
- Activity: DAST Dynamic Analysis• 5 minutes
- Review 1: Introduction to Malware• 4 minutes
- Review 2: Malware Infection• 4 minutes
- Review 3: Types of Malwares• 5 minutes
- Review 4: Ransomware• 4 minutes
- Review 5: Malware Detection Systems• 5 minutes
- Review 6: SandBox Controls• 6 minutes
- Review 7: Origin of Malware in Software• 5 minutes
- Review 8: Best Practices in Software Development• 4 minutes
- Review 9: SAST Static Analysis• 6 minutes
- Review 10: DAST Dynamic Analysis• 4 minutes
10 discussion prompts• Total 37 minutes
- Discussion: Introduction to Malware• 3 minutes
- Discussion: Malware Infection• 3 minutes
- Discussion: Types of Malwares• 3 minutes
- Discussion: Ransomware• 3 minutes
- Discussion: Malware Detection Systems• 3 minutes
- Discussion: SandBox Controls• 3 minutes
- Discussion: Origin of Malware in Software• 10 minutes
- Discussion: Best Practices in Software Development• 3 minutes
- Discussion: SAST Static Analysis• 3 minutes
- Discussion: DAST Dynamic Analysis• 3 minutes
What's included
10 videos10 readings20 assignments10 discussion prompts
10 videos• Total 33 minutes
- Video• 4 minutes
- Network Models• 3 minutes
- Physical Layer• 3 minutes
- Data Link Layer• 3 minutes
- Network Layer• 3 minutes
- Data Transport Layer • 3 minutes
- Application Layer• 3 minutes
- Secure Communication• 3 minutes
- Types of Encryptions• 4 minutes
- Public Key Infrastructure• 3 minutes
10 readings• Total 89 minutes
- Introduction to Networking• 7 minutes
- Network Models• 8 minutes
- Physical Layer• 10 minutes
- Data Link Layer• 6 minutes
- Network Layer• 10 minutes
- Data Transport Layer • 10 minutes
- Application Layer• 10 minutes
- Secure Communication• 10 minutes
- Types of Encryptions• 10 minutes
- Public Key Infrastructure• 8 minutes
20 assignments• Total 95 minutes
- Activity: Introduction to Networking• 4 minutes
- Activity: Network Models• 4 minutes
- Activity: Physical Layer• 5 minutes
- Activity: Data Link Layer• 5 minutes
- Activity: Network Layer• 4 minutes
- Activity: Data Transport Layer• 4 minutes
- Activity: Application Layer• 5 minutes
- Activity: Secure Communication• 5 minutes
- Activity: Types of Encryptions• 5 minutes
- Activity: Public Key Infrastructure• 5 minutes
- Review 1: Introduction to Networking• 4 minutes
- Review 2: Network Models• 6 minutes
- Review 3: Physical Layer• 6 minutes
- Review 4: Data Link Layer• 5 minutes
- Review 5: Network Layer• 4 minutes
- Review 6: Data Transport Layer• 5 minutes
- Review 7: Application Layer• 5 minutes
- Review 8: Secure Communication• 5 minutes
- Review 9: Types of Encryptions• 5 minutes
- Review 10: Public Key Infrastructure• 4 minutes
10 discussion prompts• Total 30 minutes
- Discussion: Introduction to Networking• 3 minutes
- Discussion: Network Models• 3 minutes
- Discussion: Physical Layer• 3 minutes
- Discussion: Data Link Layer• 3 minutes
- Discussion: Network Layer• 3 minutes
- Discussion: Data Transport Layer• 3 minutes
- Discussion: Application Layer• 3 minutes
- Discussion: Secure Communication• 3 minutes
- Discussion: Types of Encryptions• 3 minutes
- Discussion: Public Key Infrastructure• 3 minutes
What's included
10 videos10 readings20 assignments10 discussion prompts
10 videos• Total 25 minutes
- Searching on the web• 2 minutes
- Web Security • 2 minutes
- HTTP and HTTPS protocols• 3 minutes
- Metasearch Engines• 2 minutes
- Cookie Management • 3 minutes
- DNS• 3 minutes
- Password Management, Authentication, and MFA• 3 minutes
- Spoofing and Phishing Techniques• 2 minutes
- Deep Web and Dark Web• 2 minutes
- Become Anonymous• 2 minutes
10 readings• Total 53 minutes
- Searching on the web• 6 minutes
- Web Security • 7 minutes
- HTTP and HTTPS protocols• 5 minutes
- Metasearch Engines• 4 minutes
- Cookie Management • 5 minutes
- DNS• 8 minutes
- Password Management, Authentication, and MFA• 6 minutes
- Spoofing and Phishing Techniques• 4 minutes
- Deep Web and Dark Web• 4 minutes
- Become Anonymous• 4 minutes
20 assignments• Total 95 minutes
- Activity: Searching on the web• 5 minutes
- Activity: Web Security• 5 minutes
- Activity: HTTP and HTTPS protocols• 5 minutes
- Activity: Metasearch Engines• 4 minutes
- Activity: Cookie Management• 4 minutes
- Activity: DNS• 5 minutes
- Activity: Password Management, Authentication, and MFA• 5 minutes
- Activity: Spoofing and Phishing Techniques• 5 minutes
- Activity: Deep Web and Dark Web• 5 minutes
- Activity: Become Anonymous• 4 minutes
- Review 1: Searching on the web• 6 minutes
- Review 2: Web Security• 5 minutes
- Review 3: HTTP and HTTPS protocols• 5 minutes
- Review 4: Metasearch Engines• 4 minutes
- Review 5: Cookie Management• 5 minutes
- Review 6: DNS• 5 minutes
- Review 7: Password Management, Authentication, and MFA• 5 minutes
- Review 8: Spoofing and Phishing Techniques• 4 minutes
- Review 9: Deep Web and Dark Web• 5 minutes
- Review 10: Become Anonymous• 4 minutes
10 discussion prompts• Total 30 minutes
- Discussion: Searching on the web• 3 minutes
- Discussion: Web Security• 3 minutes
- Discussion: HTTP and HTTPS protocols• 3 minutes
- Discussion: Metasearch Engines• 3 minutes
- Discussion: Cookie Management• 3 minutes
- Discussion: DNS• 3 minutes
- Discussion: Password Management, Authentication, and MFA• 3 minutes
- Discussion: Spoofing and Phishing Techniques• 3 minutes
- Discussion: Deep Web and Dark Web• 3 minutes
- Discussion: Become Anonymous• 3 minutes
What's included
10 videos10 readings20 assignments10 discussion prompts
10 videos• Total 27 minutes
- Social engineering • 3 minutes
- Social Engineering Techniques• 3 minutes
- Social Media • 3 minutes
- Risks and Threats on Social Media• 3 minutes
- Best Practices for the User• 2 minutes
- Good practices for a company• 3 minutes
- Sensitive Searches• 3 minutes
- Cialdini's Principles • 3 minutes
- Phishing and Spear Phishing• 3 minutes
- Mitigation measures• 3 minutes
10 readings• Total 61 minutes
- Social engineering • 10 minutes
- Social Engineering Techniques• 4 minutes
- Social Media • 6 minutes
- Risks and Threats on Social Media• 4 minutes
- Best Practices for the User• 5 minutes
- Good practices for a company• 5 minutes
- Sensitive Searches• 8 minutes
- Cialdini's Principles • 7 minutes
- Phishing and Spear Phishing• 8 minutes
- Mitigation measures• 4 minutes
20 assignments• Total 93 minutes
- Activity: Social engineering• 5 minutes
- Activity: Social Engineering Techniques• 4 minutes
- Activity: Social Media• 5 minutes
- Activity: Risks and Threats on Social Media• 4 minutes
- Activity: Best Practices for the User• 5 minutes
- Activity: Good practices for a company• 5 minutes
- Activity: Sensitive Searches• 5 minutes
- Activity: Cialdini's Principles• 5 minutes
- Activity: Phishing and Spear Phishing• 5 minutes
- Activity: Mitigation measures• 3 minutes
- Review 1: Social Engineering• 5 minutes
- Review 2: Social Engineering Techniques• 4 minutes
- Review 3: Social Media• 5 minutes
- Review 4: Risks and Threats on Social Media• 4 minutes
- Review 5: Best Practices for the User• 5 minutes
- Review 6: Good practices for the company• 5 minutes
- Review 7: Sensitive Searches• 5 minutes
- Review 8: Cialdini's Principles• 5 minutes
- Review 9: Phishing and Spear Phishing• 4 minutes
- Review 10: Mitigation measures• 5 minutes
10 discussion prompts• Total 30 minutes
- Discussion: Social engineering• 3 minutes
- Discussion: Social Engineering Techniques• 3 minutes
- Discussion: Social Media• 3 minutes
- Discussion: Risks and Threats on Social Media• 3 minutes
- Discussion: Best Practices for the User• 3 minutes
- Discussion: Good practices for a company• 3 minutes
- Discussion: Sensitive Searches• 3 minutes
- Discussion: Cialdini's Principles• 3 minutes
- Discussion: Phishing and Spear Phishing• 3 minutes
- Discussion: Mitigation measures• 3 minutes
What's included
2 readings
2 readings• Total 8 minutes
- Survey• 5 minutes
- Muchas felicidades• 3 minutes
Instructor

Offered by

Offered by

Con más de 50 años de historia, la Universidad Anáhuac, siguiendo nuestro modelo educativo de formación integral sitúa a la persona en el centro del proceso formativo e impulsa su potencial y desarrollo pleno atendiendo las diferentes dimensiones: humana, intelectual, profesional, social y espiritual. Más de 90 mil egresados respaldan nuestra misión como Red de Universidades Anáhuac de: Contribuir a la formación integral de líderes de acción positiva y promover institucionalmente el desarrollo de la persona y de la sociedad, inspirados en los valores del humanismo cristiano.
Why people choose Coursera for their career

Felipe M.

Jennifer J.

Larry W.

Chaitanya A.
Explore more from Computer Science

Course

Course
LLearnKartS
Course
NNortheastern University
Course