About this Specialization

The Cybersecurity Specialization covers the fundamental concepts underlying the construction of secure systems, from the hardware to the software to the human-computer interface, with the use of cryptography to secure interactions. These concepts are illustrated with examples drawn from modern practice, and augmented with hands-on exercises involving relevant tools and techniques. Successful participants will develop a way of thinking that is security-oriented, better understanding how to think about adversaries and how to build systems that defend against them.

...
Globe

100% online courses

Start instantly and learn at your own schedule.
Calendar

Flexible Schedule

Set and maintain flexible deadlines.
Intermediate Level

Intermediate Level

Clock

Approx. 6 months to complete

Suggested 5 hours/week
Comment Dots

English

Subtitles: English, Korean...

Skills you will gain

Software TestingCryptographyUsabilityPenetration Test
Globe

100% online courses

Start instantly and learn at your own schedule.
Calendar

Flexible Schedule

Set and maintain flexible deadlines.
Intermediate Level

Intermediate Level

Clock

Approx. 6 months to complete

Suggested 5 hours/week
Comment Dots

English

Subtitles: English, Korean...

How the Specialization Works

Take Courses

A Coursera Specialization is a series of courses that helps you master a skill. To begin, enroll in the Specialization directly, or review its courses and choose the one you'd like to start with. When you subscribe to a course that is part of a Specialization, you’re automatically subscribed to the full Specialization. It’s okay to complete just one course — you can pause your learning or end your subscription at any time. Visit your learner dashboard to track your course enrollments and your progress.

Hands-on Project

Every Specialization includes a hands-on project. You'll need to successfully finish the project(s) to complete the Specialization and earn your certificate. If the Specialization includes a separate course for the hands-on project, you'll need to finish each of the other courses before you can start it.

Earn a Certificate

When you finish every course and complete the hands-on project, you'll earn a Certificate that you can share with prospective employers and your professional network.

how it works

There are 5 Courses in this Specialization

Course1

Usable Security

4.5
1,147 ratings
299 reviews
This course focuses on how to design and build secure systems with a human-centric focus. We will look at basic principles of human-computer interaction, and apply these insights to the design of secure systems with the goal of developing security measures that respect human performance and their goals within a system....
Course2

Software Security

4.6
702 ratings
168 reviews
This course we will explore the foundations of software security. We will consider important software vulnerabilities and attacks that exploit them -- such as buffer overflows, SQL injection, and session hijacking -- and we will consider defenses that prevent or mitigate these attacks, including advanced testing and program analysis techniques. Importantly, we take a "build security in" mentality, considering techniques at each phase of the development cycle that can be used to strengthen the security of software systems. Successful learners in this course typically have completed sophomore/junior-level undergraduate work in a technical field, have some familiarity with programming, ideally in C/C++ and one other "managed" program language (like ML or Java), and have prior exposure to algorithms. Students not familiar with these languages but with others can improve their skills through online web tutorials....
Course3

Cryptography

4.5
460 ratings
89 reviews
This course will introduce you to the foundations of modern cryptography, with an eye toward practical applications....
Course4

Hardware Security

4.0
248 ratings
51 reviews
In this course, we will study security and trust from the hardware perspective. Upon completing the course, students will understand the vulnerabilities in current digital system design flow and the physical attacks to these systems. They will learn that security starts from hardware design and be familiar with the tools and skills to build secure and trusted hardware....

Instructors

Jennifer Golbeck

Director
Human-Computer Interaction Lab

Michael Hicks

Professor
Department of Computer Science

Jonathan Katz

Professor, University of Maryland, and Director, Maryland Cybersecurity Center
Maryland Cybersecurity Center

Gang Qu

Associate Professor
Electrical and Computer Engineering

About University of Maryland, College Park

The University of Maryland is the state's flagship university and one of the nation's preeminent public research universities. A global leader in research, entrepreneurship and innovation, the university is home to more than 37,000 students, 9,000 faculty and staff, and 250 academic programs. Its faculty includes three Nobel laureates, three Pulitzer Prize winners, 47 members of the national academies and scores of Fulbright scholars. The institution has a $1.8 billion operating budget, secures $500 million annually in external research funding and recently completed a $1 billion fundraising campaign. ...

Frequently Asked Questions

  • Yes! To get started, click the course card that interests you and enroll. You can enroll and complete the course to earn a shareable certificate, or you can audit it to view the course materials for free. When you subscribe to a course that is part of a Specialization, you’re automatically subscribed to the full Specialization. Visit your learner dashboard to track your progress.

  • This course is completely online, so there’s no need to show up to a classroom in person. You can access your lectures, readings and assignments anytime and anywhere via the web or your mobile device.

  • This Specialization doesn't carry university credit, but some universities may choose to accept Specialization Certificates for credit. Check with your institution to learn more.

  • The courses do not need to be taken in a particular order.

More questions? Visit the Learner Help Center.