Digital Shield: Cybersecurity for Data and Systems Protection" is a course designed to provide a solid introduction to the protection of sensitive data and the infrastructure supporting various information systems.

Digital Shield: Cybersecurity for Data and System Protection

Digital Shield: Cybersecurity for Data and System Protection

Instructor: Daniel Zeldis
Access provided by New Apprenticeship
Details to know

Add to your LinkedIn profile
100 assignments
See how employees at top companies are mastering in-demand skills

There are 7 modules in this course
What's included
3 readings1 discussion prompt
3 readings•Total 8 minutes
- Welcome•4 minutes
- Políticas y lineamientos de calificación•2 minutes
- Políticas de Coursera•2 minutes
1 discussion prompt•Total 3 minutes
- Bienvenida Presentación•3 minutes
What's included
11 videos10 readings20 assignments10 discussion prompts
11 videos•Total 39 minutes
- Introduction•2 minutes
- Basic Concepts and Definitions•4 minutes
- Vulnerabilities and Risks•4 minutes
- Video•3 minutes
- Video•4 minutes
- Video•4 minutes
- Video•3 minutes
- Video•4 minutes
- Video•4 minutes
- Video•4 minutes
- Video•3 minutes
10 readings•Total 71 minutes
- Basic Concepts and Definitions•6 minutes
- Vulnerabilities and Risks•8 minutes
- Threats and Models•5 minutes
- Threat Model Frameworks•8 minutes
- Defense in Depth•6 minutes
- Security Controls•5 minutes
- Maturity Models•6 minutes
- Security Roles in the Organization•10 minutes
- Strategies & Metrics•8 minutes
- Information Security Governance•9 minutes
20 assignments•Total 109 minutes
- Activity: Basic Concepts and Definitions•6 minutes
- Activity: Vulnerabilities and Risks•10 minutes
- Activity: Threats and Models•5 minutes
- Activity: Threat Model Frameworks•6 minutes
- Activity: Defense in Depth•3 minutes
- Activity: Security Controls•5 minutes
- Activity: Maturity Models•5 minutes
- Activity: Security Roles in the Organization•7 minutes
- Activity: Strategies & Metrics•5 minutes
- Activity: Information Security Governance•4 minutes
- Review 1: Basic Concepts and Definitions•5 minutes
- Review 2: Vulnerabilities and Risks•6 minutes
- Review 3: Threats and Models•7 minutes
- Review 4: Threat Model Frameworks•5 minutes
- Review 5: Defense in Depth•5 minutes
- Review 6: Security Controls•5 minutes
- Review 7: Maturity Models•5 minutes
- Review 8: Security Roles in the Organization•5 minutes
- Review 9: Strategies & Metrics•5 minutes
- Review 10: Information Security Governance•5 minutes
10 discussion prompts•Total 30 minutes
- Discussion: Basic Concepts and Definitions•3 minutes
- Discussion: Vulnerabilities and Risks•3 minutes
- Discussion: Threats and Models•3 minutes
- Discussion: Threat Model Frameworks•3 minutes
- Discussion: Defense in Depth •3 minutes
- Discussion: Security Controls•3 minutes
- Discussion: Maturity Models•3 minutes
- Discussion: Security Roles in the Organization•3 minutes
- Discussion: Strategies & Metrics•3 minutes
- Discussion: Information Security Governance•3 minutes
What's included
10 videos10 readings20 assignments10 discussion prompts
10 videos•Total 29 minutes
- Introduction to Malware•3 minutes
- Malware Infection•2 minutes
- Types of Malwares•4 minutes
- Ransomware•3 minutes
- Malware Detection Systems •3 minutes
- SandBox Controls•2 minutes
- Origin of Malware in Software•3 minutes
- Best Practices in Software Development•4 minutes
- SAST Static Analysis •2 minutes
- DAST Dynamic Analysis •2 minutes
10 readings•Total 72 minutes
- Introduction to Malware•5 minutes
- Malware Infection•6 minutes
- Types of Malwares•10 minutes
- Ransomware•7 minutes
- Malware Detection Systems •10 minutes
- SandBox Controls•8 minutes
- Origin of Malware in Software•6 minutes
- Best Practices in Software Development•5 minutes
- SAST Static Analysis •8 minutes
- DAST Dynamic Analysis •7 minutes
20 assignments•Total 96 minutes
- Activity: Introduction to Malware•5 minutes
- Activity: Malware Infection•5 minutes
- Activity: Types of Malwares•5 minutes
- Activity: Ransomware•5 minutes
- Activity: Malware Detection Systems•4 minutes
- Activity: SandBox Controls•5 minutes
- Activity: Origin of Malware in Software•5 minutes
- Activity: Best Practices in Software Development•5 minutes
- Activity: SAST Static Analysis•5 minutes
- Activity: DAST Dynamic Analysis•5 minutes
- Review 1: Introduction to Malware•4 minutes
- Review 2: Malware Infection•4 minutes
- Review 3: Types of Malwares•5 minutes
- Review 4: Ransomware•4 minutes
- Review 5: Malware Detection Systems•5 minutes
- Review 6: SandBox Controls•6 minutes
- Review 7: Origin of Malware in Software•5 minutes
- Review 8: Best Practices in Software Development•4 minutes
- Review 9: SAST Static Analysis•6 minutes
- Review 10: DAST Dynamic Analysis•4 minutes
10 discussion prompts•Total 37 minutes
- Discussion: Introduction to Malware•3 minutes
- Discussion: Malware Infection•3 minutes
- Discussion: Types of Malwares•3 minutes
- Discussion: Ransomware•3 minutes
- Discussion: Malware Detection Systems•3 minutes
- Discussion: SandBox Controls•3 minutes
- Discussion: Origin of Malware in Software•10 minutes
- Discussion: Best Practices in Software Development•3 minutes
- Discussion: SAST Static Analysis•3 minutes
- Discussion: DAST Dynamic Analysis•3 minutes
What's included
10 videos10 readings20 assignments10 discussion prompts
10 videos•Total 33 minutes
- Video•4 minutes
- Network Models•3 minutes
- Physical Layer•3 minutes
- Data Link Layer•3 minutes
- Network Layer•3 minutes
- Data Transport Layer •3 minutes
- Application Layer•3 minutes
- Secure Communication•3 minutes
- Types of Encryptions•4 minutes
- Public Key Infrastructure•3 minutes
10 readings•Total 89 minutes
- Introduction to Networking•7 minutes
- Network Models•8 minutes
- Physical Layer•10 minutes
- Data Link Layer•6 minutes
- Network Layer•10 minutes
- Data Transport Layer •10 minutes
- Application Layer•10 minutes
- Secure Communication•10 minutes
- Types of Encryptions•10 minutes
- Public Key Infrastructure•8 minutes
20 assignments•Total 95 minutes
- Activity: Introduction to Networking•4 minutes
- Activity: Network Models•4 minutes
- Activity: Physical Layer•5 minutes
- Activity: Data Link Layer•5 minutes
- Activity: Network Layer•4 minutes
- Activity: Data Transport Layer•4 minutes
- Activity: Application Layer•5 minutes
- Activity: Secure Communication•5 minutes
- Activity: Types of Encryptions•5 minutes
- Activity: Public Key Infrastructure•5 minutes
- Review 1: Introduction to Networking•4 minutes
- Review 2: Network Models•6 minutes
- Review 3: Physical Layer•6 minutes
- Review 4: Data Link Layer•5 minutes
- Review 5: Network Layer•4 minutes
- Review 6: Data Transport Layer•5 minutes
- Review 7: Application Layer•5 minutes
- Review 8: Secure Communication•5 minutes
- Review 9: Types of Encryptions•5 minutes
- Review 10: Public Key Infrastructure•4 minutes
10 discussion prompts•Total 30 minutes
- Discussion: Introduction to Networking•3 minutes
- Discussion: Network Models•3 minutes
- Discussion: Physical Layer•3 minutes
- Discussion: Data Link Layer•3 minutes
- Discussion: Network Layer•3 minutes
- Discussion: Data Transport Layer•3 minutes
- Discussion: Application Layer•3 minutes
- Discussion: Secure Communication•3 minutes
- Discussion: Types of Encryptions•3 minutes
- Discussion: Public Key Infrastructure•3 minutes
What's included
10 videos10 readings20 assignments10 discussion prompts
10 videos•Total 25 minutes
- Searching on the web•2 minutes
- Web Security •2 minutes
- HTTP and HTTPS protocols•3 minutes
- Metasearch Engines•2 minutes
- Cookie Management •3 minutes
- DNS•3 minutes
- Password Management, Authentication, and MFA•3 minutes
- Spoofing and Phishing Techniques•2 minutes
- Deep Web and Dark Web•2 minutes
- Become Anonymous•2 minutes
10 readings•Total 53 minutes
- Searching on the web•6 minutes
- Web Security •7 minutes
- HTTP and HTTPS protocols•5 minutes
- Metasearch Engines•4 minutes
- Cookie Management •5 minutes
- DNS•8 minutes
- Password Management, Authentication, and MFA•6 minutes
- Spoofing and Phishing Techniques•4 minutes
- Deep Web and Dark Web•4 minutes
- Become Anonymous•4 minutes
20 assignments•Total 95 minutes
- Activity: Searching on the web•5 minutes
- Activity: Web Security•5 minutes
- Activity: HTTP and HTTPS protocols•5 minutes
- Activity: Metasearch Engines•4 minutes
- Activity: Cookie Management•4 minutes
- Activity: DNS•5 minutes
- Activity: Password Management, Authentication, and MFA•5 minutes
- Activity: Spoofing and Phishing Techniques•5 minutes
- Activity: Deep Web and Dark Web•5 minutes
- Activity: Become Anonymous•4 minutes
- Review 1: Searching on the web•6 minutes
- Review 2: Web Security•5 minutes
- Review 3: HTTP and HTTPS protocols•5 minutes
- Review 4: Metasearch Engines•4 minutes
- Review 5: Cookie Management•5 minutes
- Review 6: DNS•5 minutes
- Review 7: Password Management, Authentication, and MFA•5 minutes
- Review 8: Spoofing and Phishing Techniques•4 minutes
- Review 9: Deep Web and Dark Web•5 minutes
- Review 10: Become Anonymous•4 minutes
10 discussion prompts•Total 30 minutes
- Discussion: Searching on the web•3 minutes
- Discussion: Web Security•3 minutes
- Discussion: HTTP and HTTPS protocols•3 minutes
- Discussion: Metasearch Engines•3 minutes
- Discussion: Cookie Management•3 minutes
- Discussion: DNS•3 minutes
- Discussion: Password Management, Authentication, and MFA•3 minutes
- Discussion: Spoofing and Phishing Techniques•3 minutes
- Discussion: Deep Web and Dark Web•3 minutes
- Discussion: Become Anonymous•3 minutes
What's included
10 videos10 readings20 assignments10 discussion prompts
10 videos•Total 27 minutes
- Social engineering •3 minutes
- Social Engineering Techniques•3 minutes
- Social Media •3 minutes
- Risks and Threats on Social Media•3 minutes
- Best Practices for the User•2 minutes
- Good practices for a company•3 minutes
- Sensitive Searches•3 minutes
- Cialdini's Principles •3 minutes
- Phishing and Spear Phishing•3 minutes
- Mitigation measures•3 minutes
10 readings•Total 61 minutes
- Social engineering •10 minutes
- Social Engineering Techniques•4 minutes
- Social Media •6 minutes
- Risks and Threats on Social Media•4 minutes
- Best Practices for the User•5 minutes
- Good practices for a company•5 minutes
- Sensitive Searches•8 minutes
- Cialdini's Principles •7 minutes
- Phishing and Spear Phishing•8 minutes
- Mitigation measures•4 minutes
20 assignments•Total 93 minutes
- Activity: Social engineering•5 minutes
- Activity: Social Engineering Techniques•4 minutes
- Activity: Social Media•5 minutes
- Activity: Risks and Threats on Social Media•4 minutes
- Activity: Best Practices for the User•5 minutes
- Activity: Good practices for a company•5 minutes
- Activity: Sensitive Searches•5 minutes
- Activity: Cialdini's Principles•5 minutes
- Activity: Phishing and Spear Phishing•5 minutes
- Activity: Mitigation measures•3 minutes
- Review 1: Social Engineering•5 minutes
- Review 2: Social Engineering Techniques•4 minutes
- Review 3: Social Media•5 minutes
- Review 4: Risks and Threats on Social Media•4 minutes
- Review 5: Best Practices for the User•5 minutes
- Review 6: Good practices for the company•5 minutes
- Review 7: Sensitive Searches•5 minutes
- Review 8: Cialdini's Principles•5 minutes
- Review 9: Phishing and Spear Phishing•4 minutes
- Review 10: Mitigation measures•5 minutes
10 discussion prompts•Total 30 minutes
- Discussion: Social engineering•3 minutes
- Discussion: Social Engineering Techniques•3 minutes
- Discussion: Social Media•3 minutes
- Discussion: Risks and Threats on Social Media•3 minutes
- Discussion: Best Practices for the User•3 minutes
- Discussion: Good practices for a company•3 minutes
- Discussion: Sensitive Searches•3 minutes
- Discussion: Cialdini's Principles•3 minutes
- Discussion: Phishing and Spear Phishing•3 minutes
- Discussion: Mitigation measures•3 minutes
What's included
2 readings
2 readings•Total 8 minutes
- Survey•5 minutes
- Muchas felicidades•3 minutes
Instructor

Offered by

Offered by

Con más de 50 años de historia, la Universidad Anáhuac, siguiendo nuestro modelo educativo de formación integral sitúa a la persona en el centro del proceso formativo e impulsa su potencial y desarrollo pleno atendiendo las diferentes dimensiones: humana, intelectual, profesional, social y espiritual. Más de 90 mil egresados respaldan nuestra misión como Red de Universidades Anáhuac de: Contribuir a la formación integral de líderes de acción positiva y promover institucionalmente el desarrollo de la persona y de la sociedad, inspirados en los valores del humanismo cristiano.
Why people choose Coursera for their career

Felipe M.

Jennifer J.

Larry W.

Chaitanya A.
Explore more from Computer Science

Course
Category: Credit offeredCredit offered
Course
Category: Credit offeredCredit offered
LLearnKartS
Course
Category: Credit offeredCredit offered
NNortheastern University
Course
Category: Credit offeredCredit offered