Some related experience required.
Fundamentals of Computer Network Security Specialization
Launch your career in cyber security. Master security principles and tools for securing your networks, systems, and data.
About this Specialization
Applied Learning Project
With the learner's cloned instance from my AWS image, our Project 1a-d integrate the security principles and knowledge covered in first MOOC and apply them in real world tasks using state of art tools, such as gpg for signing and verifying documents/open source software packages, misc/CA scripts for performing CA certificate signing tasks, generate server/client certificates, and setup on apache web server for secure web access with mutual authentication. Project2a-b cover the use of OpenSSL for encrypting/decrypting data, and Diffi-Hellman key exchange. The related lectures cover the development of secure programs using Crypto API. Projects 3a-b cover hacking and patching with command injections and SQL injections. Project 3c cover cracking Linux passwords with hashcat using AWS P2 GPU instance. Project 4a-b cover the construction of DMZ firewall system with iptables to provide DNAT, masquerade services, filtering packets to secure serves in two AWS virtual private clouds.
Some related experience required.
University of Colorado System
The University of Colorado is a recognized leader in higher education on the national and global stage. We collaborate to meet the diverse needs of our students and communities. We promote innovation, encourage discovery and support the extension of knowledge in ways unique to the state of Colorado and beyond.
Frequently Asked Questions
What is the refund policy?
If you subscribed, you get a 7-day free trial during which you can cancel at no penalty. After that, we don’t give refunds, but you can cancel your subscription at any time. See our full refund policy.
Can I just enroll in a single course?
Yes! To get started, click the course card that interests you and enroll. You can enroll and complete the course to earn a shareable certificate, or you can audit it to view the course materials for free. When you subscribe to a course that is part of a Specialization, you’re automatically subscribed to the full Specialization. Visit your learner dashboard to track your progress.
Is financial aid available?
Yes, Coursera provides financial aid to learners who cannot afford the fee. Apply for it by clicking on the Financial Aid link beneath the "Enroll" button on the left. You'll be prompted to complete an application and will be notified if you are approved. You'll need to complete this step for each course in the Specialization, including the Capstone Project. Learn more.
Can I take the course for free?
When you enroll in the course, you get access to all of the courses in the Specialization, and you earn a certificate when you complete the work. If you only want to read and view the course content, you can audit the course for free. If you cannot afford the fee, you can apply for financial aid.
Is this course really 100% online? Do I need to attend any classes in person?
This course is completely online, so there’s no need to show up to a classroom in person. You can access your lectures, readings and assignments anytime and anywhere via the web or your mobile device.
How long does it take to complete the Specialization?
What background knowledge is necessary?
Know one high level programming language, basic Unix system commands, and discrete mathematics in particular the number theory.
Do I need to take the courses in a specific order?
Yes. MOOC1 covers security design principles and concepts. Learning it first will help understand basic security terms which are used in other MOOCs and how the principles and basic security services are applied in various situations. MOOC2 helps the learners understanding the basic cryptography and related crypto API to create secure web app. These knowledge help learners assess the hacking and patching skill/tools needed in MOOC3. MOOC4 should be done last since it integrates all cyber security knowledge to implement security policies and their enforcement procedures for hardening a networked systems.
Will I earn university credit for completing the Specialization?
At this time, this Specialization is not credit bearing. At a future time, this content may contribute in part towards university credit. Please note that additional costs and requirements may be entailed once credit is offered.
What will I be able to do upon completing the Specialization?
You should be able to create public/private keys, certificate requests, install/sign/verify them for web server and client authentication, secure emails, and code signing.
You should be able to write secure web apps with Crypto API to implement the confidentiality, integrity, and availability basic security services.
You should be able to hack web applications with Command Injection and SQL Injection vulnerabilities and patch them.
You should be able to apply penetration testing tool to exploit vulnerable systems.
You should be able to use hashcat softare and AWS P3 GPU to crack passwords using dictionary attacks and mask patterns.
You should be able to configure firewall and IDS for secure network systems using AWS VPCs.
You should be able to specify effective security policies and implement efficient enforcement procedures by applying security design principles for securing network systems.
More questions? Visit the Learner Help Center.