Familiarity with modern technologies and methods for protecting information and systems in the field of cybersecurity.
Suggested by: Coursera (What is Coursera?)
No prior knowledge required
No unnecessary risks
The Introduction to Cybersecurity course is designed to help learners develop a deeper understanding of modern information and systems protection technologies and methods. The learning outcome is simple: we hope that learners will develop a passion and lasting appreciation for cybersecurity, which will assist them in their future endeavors.
will benefit from this learning experience. Personalized interviews with industry partners are included to connect cybersecurity concepts with relevant business experiences.
Quizzes and projects for the Introductory Cybersecurity course are designed to reinforce understanding and recall of the topics studied. The emphasis is on fundamental topics, not just memorizing facts.
This course provides students with a basic understanding of common threats, vulnerabilities, and risks in the field of cybersecurity. The course includes an overview of how basic cyber attacks are constructed and targeted against real systems. Examples include:
Network attacks such as:
are described and illustrated with real-world examples from the past few decades. Familiar analytical models such as the CIA Security Threat Framework (Confidentiality/Integrity/Availability) are introduced, and examples demonstrate how different types of threats can harm real assets. The course also includes an introduction to basic cybersecurity risk analysis, with an overview of how threat-asset matrices can be used to prioritize risk decisions. Threats, vulnerabilities, and attacks are examined and mapped in the context of systems security engineering methodologies.
This course introduces the fundamentals of cybersecurity, starting with fundamental models such as Bell-LaPadula and information flow frameworks. These basic policy enforcement mechanisms help introduce basic functional defenses, starting with authentication methods. Students will be introduced to a range of different authentication solutions and protocols, including RSA SecureID and Kerberos, in the context of a canonical scheme. The course will also include an introduction to the basics of cryptography, with an emphasis on regular ciphers and public-key cryptography. Important cryptographic techniques such as block chaining and triple-DES are explained. Modern cryptographic backends in certificate services are discussed and how they support secure e-commerce using SSL schemes.
This course introduces real-time cybersecurity techniques and methods in the context of TCP/IP protocols. An explanation of some of the basic TCP/IP hacks is used to clarify the need for network security solutions such as stateless and stateful firewalls. Students will be exposed to techniques used in the design and configuration of firewall solutions such as packet filters and proxies to protect organizational assets.
Perimeter solutions such as firewalls and intrusion prevention systems present significant shortcomings in common enterprise environments. The result of these weaknesses can sometimes manifest as advanced persistent threats (APTs) from state-sponsored actors. Such attacks, such as DDOS and third-party attacks, point to potential solutions for modern organizations.
This course introduces a series of advanced and current topics in cybersecurity, many of which are particularly relevant in the context of modern enterprises and infrastructures. The fundamentals of enterprise compliance frameworks are introduced, with an introduction to NIST and PCI. Hybrid cloud architecture offers an opportunity to fix most of the weaknesses in the security of modern on-premises networks.
Emerging security topics in blockchain, disruptive algorithms, the Internet of Things (IoT), and critical infrastructure protection are also described in the context of cyber risks. Resilient approaches to mobile security and cloud security are also presented. The course concludes with some practical tips for students on how to plan a career in cybersecurity.



