Prepares students for a role as a network security administrator and analyst. Topics include viruses, worms, other attack mechanisms, vulnerabilities and countermeasures, network security protocols, encryption, identity and authentication, scanning, firewalls, security tools, and organizations addressing security. A component of this course is a self-contained team project that, if the student wishes, can be extended into a full operational security system in a follow-course.

Cyber Security Technologies

Cyber Security Technologies


Instructors: Maurice E. Dawson
Instructors
Instructor ratings
We asked all learners to give feedback on our instructors based on the quality of their teaching style.


Access provided by Shoolini University
25 reviews
Recommended experience
Recommended experience
Intermediate level
Ideal for those with 1-2 years of tech experience, this intermediate course enhances skills in network security, threats, and defense strategies.
25 reviews
Recommended experience
Recommended experience
Intermediate level
Ideal for those with 1-2 years of tech experience, this intermediate course enhances skills in network security, threats, and defense strategies.
Skills you'll gain
- Cyber Security Policies
- Information Systems Security
- Cyber Operations
- Network Administration
- Cyber Attacks
- Disaster Recovery
- Cryptography
- Infrastructure Security
- Security Controls
- Telecommunications
- Data Security
- Computer Security
- Cryptographic Protocols
- Cybersecurity
- Encryption
- IT Security Architecture
- NIST 800-53
- Application Security
- Governance Risk Management and Compliance
- Network Security
Details to know

Add to your LinkedIn profile
32 assignments
See how employees at top companies are mastering in-demand skills

There are 9 modules in this course
Welcome to Cyber Security Technologies! This module offers a comprehensive foundation for understanding the dynamic field of cyber security. Students will explore various career pathways within cyber security, gaining insights into the roles, responsibilities, and skills required. This module also delves into current trends affecting the cyber landscape and provides an overview of information security principles, including risk management strategies. Through this exploration, students will be equipped with the knowledge to navigate and contribute to the field of cyber security effectively.
What's included
12 videos6 readings4 assignments2 discussion prompts
12 videos• Total 75 minutes
- Course Overview• 1 minute
- Instructor Introduction• 2 minutes
- Module 1 Introduction• 1 minute
- Careers in Cyber Security - Part 1• 10 minutes
- Careers in Cyber Security - Part 2• 7 minutes
- Exploring Cyber Security Trends - Part 1• 8 minutes
- Exploring Cyber Security Trends - Part 2• 7 minutes
- Information Security and Risk Management - Part 1• 7 minutes
- Information Security and Risk Management - Part 2• 6 minutes
- Module 1 Lab - Cyber Seek and Intro to NICE - Part 1• 8 minutes
- Module 1 Lab - Cyber Seek and Intro to NICE - Part 2• 8 minutes
- Module 1 Lab - Cyber Seek and Intro to NICE - Part 3• 10 minutes
6 readings• Total 210 minutes
- Syllabus• 10 minutes
- Careers in Cyber Security• 60 minutes
- Security Trends• 60 minutes
- Information Security and Risk Management • 60 minutes
- Module 1 Lab Activity: Downloading and Setting Up Virtual Machines with Ubuntu and Kali Linux• 10 minutes
- Module 1 Summary• 10 minutes
4 assignments• Total 165 minutes
- Module 1 Summative Assessment• 120 minutes
- Careers in Cyber Security Quiz• 15 minutes
- Security Trends Quiz• 15 minutes
- Information Security and Risk Management Quiz• 15 minutes
2 discussion prompts• Total 20 minutes
- Meet and Greet Discussion• 10 minutes
- Module 1 Lab Summary and Discussion• 10 minutes
In Module 2, learners will delve into the core principles of access control, understanding how proper implementation can strengthen system security. This module includes creating basic Bash scripts, offering practical skills for system administration tasks. Additionally, students will learn to apply the guidelines of the NIST Special Publication 800 Series, ensuring compliance with industry-standard security practices. This module is designed to equip learners with the technical expertise for managing access control and enhancing security through scripting and regulatory frameworks.
What's included
10 videos5 readings4 assignments1 discussion prompt
10 videos• Total 70 minutes
- Module 2 Introduction• 1 minute
- Access Control Fundamentals - Part 1• 7 minutes
- Access Control Fundamentals - Part 2• 6 minutes
- Introduction to Bash Scripting - Part 1• 8 minutes
- Introduction to Bash Scripting - Part 2• 5 minutes
- NIST SP 800 Series Overview - Part 1• 7 minutes
- NIST SP 800 Series Overview - Part 2• 6 minutes
- Module 2 Lab - Lab System Status & Ports - Part 1• 9 minutes
- Module 2 Lab - Lab System Status & Ports - Part 2• 10 minutes
- Module 2 Lab - Capturing Traffic - Install Script & Hardening• 10 minutes
5 readings• Total 200 minutes
- Access Control Fundamentals• 60 minutes
- Introduction to Bash Scripting• 60 minutes
- NIST SP 800 Series Overview• 60 minutes
- Module 2 Lab Activity: Developing System Administration Scripts in VIM on Ubuntu• 10 minutes
- Module 2 Summary• 10 minutes
4 assignments• Total 165 minutes
- Module 2 Summative Assessment• 120 minutes
- Access Control Fundamentals Quiz• 15 minutes
- Introduction to Bash Scripting Quiz• 15 minutes
- NIST SP 800 Series Overview Quiz• 15 minutes
1 discussion prompt• Total 10 minutes
- Module 2 Lab Summary and Discussion• 10 minutes
Module 3 provides an in-depth look at the foundational elements that make up security architecture, enabling learners to evaluate the structure and behavior of secure systems. Students will also assess the effectiveness of the NIST 800-53 security controls, gaining the ability to apply these guidelines to protect information systems. Additionally, this module covers the unique security considerations inherent in virtualization technology, offering insights into how to maintain robust security in increasingly virtualized environments. This module provides students with the evaluative skills necessary to design and critique security architectures within a variety of technological contexts.
What's included
8 videos5 readings4 assignments1 discussion prompt
8 videos• Total 50 minutes
- Module 3 Introduction• 1 minute
- Security Architecture Principles - Part 1• 9 minutes
- Security Architecture Principles - Part 2• 7 minutes
- NIST 800-53 Controls• 10 minutes
- Virtualization Security - Part 1• 5 minutes
- Virtualization Security - Part 2• 6 minutes
- Module 3 Lab - C++ Static Code Analysis - Part 1• 6 minutes
- Module 3 Lab - C++ Static Code Analysis - Part 2• 6 minutes
5 readings• Total 200 minutes
- Security Architecture Principles• 60 minutes
- NIST 800-53 Controls• 60 minutes
- Virtualization Security• 60 minutes
- Module 3 Lab Activity: Understanding and Implementing the Risk Management Framework (RMF) Process• 10 minutes
- Module 3 Summary• 10 minutes
4 assignments• Total 165 minutes
- Module 3 Summative Assessment• 120 minutes
- Security Architecture Principles Quiz• 15 minutes
- NIST 800-53 Controls Quiz• 15 minutes
- Virtualization Security Quiz• 15 minutes
1 discussion prompt• Total 10 minutes
- Module 3 Lab Summary and Discussion• 10 minutes
Module 4 offers a deep dive into the critical, often overlooked aspects of security that go beyond the digital realm. Learners will acquire the knowledge to apply fundamental physical security measures, understanding the vital role these play in comprehensive security strategy. This module also explores the environmental factors that impact security, from natural disasters to climate control, and evaluates the technologies — from biometrics to surveillance systems — that are employed to enhance physical security measures. Through this module, students will be equipped to assess and improve the physical and environmental security aspects of various organizations.
What's included
9 videos5 readings4 assignments1 discussion prompt
9 videos• Total 60 minutes
- Module 4 Introduction• 1 minute
- Physical and Environmental Security in Cybersecurity - Part 1• 8 minutes
- Physical and Environmental Security in Cybersecurity - Part 2• 9 minutes
- Environmental Security in Data Centers - Part 1• 7 minutes
- Environmental Security in Data Centers - Part 2• 6 minutes
- Physical and Environmental Security Technologies - Part 1• 8 minutes
- Physical and Environmental Security Technologies - Part 2• 9 minutes
- Module 4 Lab - Global Terrorism Database High Level Overview - Part 1• 7 minutes
- Module 4 Lab - Global Terrorism Database High Level Overview - Part 2• 6 minutes
5 readings• Total 200 minutes
- Physical Security Fundamentals• 60 minutes
- Environmental Security Considerations• 60 minutes
- Security Technologies for Physical Protection• 60 minutes
- Module 4 Lab Activity: Exploring the START Lab Global Terrorism Database (GTD)• 10 minutes
- Module 4 Summary• 10 minutes
4 assignments• Total 165 minutes
- Module 4 Summative Assessment• 120 minutes
- Physical Security Fundamentals Quiz• 15 minutes
- Environmental Security Considerations Quiz• 15 minutes
- Security Technologies for Physical Protection Quiz• 15 minutes
1 discussion prompt• Total 10 minutes
- Module 4 Lab Summary and Discussion• 10 minutes
Module 5 provides an essential exploration of the strategies and tools necessary for protecting both private and enterprise networks. Students will delve into the basics of network security, gaining the skills to analyze vulnerabilities and implement effective security measures. This module further details the intricacies of securing telecommunications systems, including an evaluation of various network security protocols, ensuring that learners are prepared to address the challenges presented by the diverse array of communication technologies in use today.
What's included
8 videos5 readings4 assignments1 discussion prompt
8 videos• Total 51 minutes
- Module 5 Introduction• 1 minute
- Safeguarding Digital Infrastructure - Part 1• 5 minutes
- Safeguarding Digital Infrastructure - Part 2• 6 minutes
- Securing Wireless Networks• 8 minutes
- Safeguarding Digital Communications• 7 minutes
- Module 5 Lab - Nmap and UFW• 11 minutes
- Module 5 Lab - Wireshark and Data Visualization - Part 1• 4 minutes
- Module 5 Lab - Wireshark and Data Visualization - Part 2• 9 minutes
5 readings• Total 200 minutes
- Network Security Fundamentals• 60 minutes
- Telecommunications Security• 60 minutes
- Security Protocols• 60 minutes
- Module 5 Lab Activity: Installing and Using Wireshark, UFW, GUFW, and Nmap on Ubuntu • 10 minutes
- Module 5 Summary• 10 minutes
4 assignments• Total 165 minutes
- Module 5 Summative Assessment• 120 minutes
- Network Security Fundamentals Quiz• 15 minutes
- Telecommunications Security Quiz• 15 minutes
- Security Protocols Quiz• 15 minutes
1 discussion prompt• Total 10 minutes
- Module 5 Lab Summary and Discussion• 10 minutes
Module 6 demystifies the complex world of cryptography, providing learners with a clear understanding of its fundamental principles and the pivotal role it plays in securing information. Students will critically evaluate various cryptographic algorithms, from classic ciphers to cutting-edge public-key cryptosystems, to understand their applications and limitations. This module provides opportunities to create practical applications of cryptography, giving learners valuable experience in employing cryptographic techniques to real-world security challenges.
What's included
6 videos5 readings4 assignments1 discussion prompt
6 videos• Total 43 minutes
- Module 6 Introduction• 1 minute
- Fundamentals of Cryptography - Part 1• 7 minutes
- Fundamentals of Cryptography - Part 2• 5 minutes
- Cryptographic Algorithms - Securing Digital Information• 10 minutes
- Applications of Cryptography in Network Security• 9 minutes
- Module 6 Lab - Email Encryption• 11 minutes
5 readings• Total 200 minutes
- Understand the Basics of Cryptography• 60 minutes
- Cryptographic Algorithms• 60 minutes
- Applications of Cryptography• 60 minutes
- Module 6 Lab Activity: Installing and Using Thunderbird for Email Encryption, VeraCrypt, and Tor on Ubuntu • 10 minutes
- Module 6 Summary• 10 minutes
4 assignments• Total 165 minutes
- Module 6 Summative Assessment• 120 minutes
- Understand the Basics of Cryptography Quiz• 15 minutes
- Cryptographic Algorithms Quiz• 15 minutes
- Applications of Cryptography Quiz• 15 minutes
1 discussion prompt• Total 10 minutes
- Module 6 Lab Summary and Discussion• 10 minutes
Module 7 equips learners with the skills to ensure that organizations can continue operating in the face of disruptions and quickly recover from any form of disaster. Through detailed exploration, students will grasp the core principles of business continuity planning and delve into analyzing various disaster recovery strategies, understanding their applicability and effectiveness. Additionally, this module offers a deep dive into the critical processes of risk assessment and management, enabling learners to identify potential threats and devise operational responses that minimize impact and facilitate swift recovery.
What's included
9 videos5 readings4 assignments1 discussion prompt
9 videos• Total 68 minutes
- Module 7 Introduction• 1 minute
- Safeguarding Your Organization - Part 1• 8 minutes
- Safeguarding Your Organization - Part 2• 6 minutes
- Safeguarding Business Continuity - Part 1• 7 minutes
- Safeguarding Business Continuity - Part 2• 7 minutes
- Risk Assessment and Management in Cybersecurity - Part 1• 9 minutes
- Risk Assessment and Management in Cybersecurity - Part 2• 10 minutes
- Module 7 Lab - Risk Management Log and POA&M - Part 1• 10 minutes
- Module 7 Lab - Risk Management Log and POA&M - Part 2• 10 minutes
5 readings• Total 200 minutes
- Business Continuity Planning• 60 minutes
- Disaster Recovery Strategies• 60 minutes
- Risk Assessment and Management• 60 minutes
- Module 7 Lab Activity: Business Continuity Planning, Disaster Recovery Strategies, and Risk Assessment• 10 minutes
- Module 7 Summary• 10 minutes
4 assignments• Total 165 minutes
- Module 7 Summative Assessment• 120 minutes
- Business Continuity Planning Quiz• 15 minutes
- Disaster Recovery Strategies Quiz• 15 minutes
- Risk Assessment and Management Quiz• 15 minutes
1 discussion prompt• Total 10 minutes
- Module 7 Lab Summary and Discussion• 10 minutes
Module 8 offers an in-depth look at the complex landscape of laws and regulations shaping the cybersecurity domain. Students will explore a wide spectrum of legal and regulatory issues, gaining an understanding of how these frameworks impact both individuals and organizations in the field of cybersecurity. Moreover, this module dives into the analysis of different compliance frameworks, equipping learners with the knowledge to navigate and adhere to various global and regional regulations, thereby ensuring that cybersecurity practices meet legal obligations and industry standards.
What's included
9 videos4 readings3 assignments1 discussion prompt
9 videos• Total 57 minutes
- Module 8 Introduction• 1 minute
- Legal and Regulatory Issues in Cybersecurity - Part 1• 5 minutes
- Legal and Regulatory Issues in Cybersecurity - Part 2• 6 minutes
- Compliance Framework in Cybersecurity - Part 1• 6 minutes
- Compliance Framework in Cybersecurity - Part 2• 8 minutes
- Module 8 Lab - Maltego Walkthrough - Part 1• 9 minutes
- Module 8 Lab - Maltego Walkthrough - Part 2• 7 minutes
- Module 8 Lab - Maltego Walkthrough - Part 3• 8 minutes
- Module 8 Lab - Maltego Walkthrough - Part 4• 7 minutes
4 readings• Total 140 minutes
- Legal and Regulatory Issues• 60 minutes
- Compliance Frameworks• 60 minutes
- Module 8 Lab Activity: Legal and Regulatory Issues and Compliance Frameworks in Cybersecurity• 10 minutes
- Module 8 Summary• 10 minutes
3 assignments• Total 150 minutes
- Module 8 Summative Assessment• 120 minutes
- Legal and Regulatory Issues Quiz• 15 minutes
- Compliance Frameworks Quiz• 15 minutes
1 discussion prompt• Total 10 minutes
- Module 8 Lab Summary and Discussion• 10 minutes
This module contains the summative course assessment that has been designed to evaluate your understanding of the course material and assess your ability to apply the knowledge you have acquired throughout the course.
What's included
1 assignment
1 assignment• Total 180 minutes
- Course Summative Assessment• 180 minutes
Build toward a degree
This course is part of the following degree program(s) offered by Illinois Tech. If you are admitted and enroll, your completed coursework may count toward your degree learning and your progress can transfer with you.¹
Build toward a degree
This course is part of the following degree program(s) offered by Illinois Tech. If you are admitted and enroll, your completed coursework may count toward your degree learning and your progress can transfer with you.¹
Illinois Tech
Bachelor of Information Technology
Degree
¹Successful application and enrollment are required. Eligibility requirements apply. Each institution determines the number of credits recognized by completing this content that may count towards degree requirements, considering any existing credits you may have. Click on a specific course for more information.
Instructors
Instructor ratings
We asked all learners to give feedback on our instructors based on the quality of their teaching style.


Offered by

Offered by

Illinois Tech is a top-tier, nationally ranked, private research university with programs in engineering, computer science, architecture, design, science, business, human sciences, and law. The university offers bachelor of science, master of science, professional master’s, and Ph.D. degrees—as well as certificates for in-demand STEM fields and other areas of innovation. Talented students from around the world choose to study at Illinois Tech because of the access to real-world opportunities, renowned academic programs, high value, and career prospects of graduates.
Why people choose Coursera for their career

Felipe M.

Jennifer J.

Larry W.

Chaitanya A.
Learner reviews
25 reviews
- 5 stars
68%
- 4 stars
20%
- 3 stars
4%
- 2 stars
4%
- 1 star
4%
Showing 3 of 25
Reviewed on Oct 10, 2025
thank you CST it helps lot to me and improved knowledge in new things
Explore more from Computer Science
BBall State University
Course

Course
MMacquarie University
Course
JJohns Hopkins University
Course