Online Course – New York University Certified Professional Internship in Cybersecurity

Familiarity with modern technologies and methods for protecting information and systems in the field of cybersecurity.

Suggested by: Coursera (What is Coursera?)

Professional Certificate

Beginners

No prior knowledge required

Time to complete the course

7-day free trial

No unnecessary risks

Skills you will acquire in the course

  • Cyber ​​Password
  • Cryptography
  • Risk assessment
  • Cyber ​​protection
  • Cyber ​​attacks

What you will learn in the course

Courses for which the course is suitable

  • Cybersecurity expert
  • Information Security Manager
  • Cybersecurity Engineer
  • Software developer with a specialization in cybersecurity
  • Cybersecurity Consultant
  • Information Security Analyst
  • Cybersecurity researcher
  • Cybersecurity Project Manager
  • Cyber ​​Risk Management Specialist
  • Cybersecurity Guide

Internship – a four-part course series

Introductory course to cybersecurity

The Introduction to Cybersecurity course is designed to help learners develop a deeper understanding of modern information and systems protection technologies and methods. The learning outcome is simple: we hope that learners will develop a passion and lasting appreciation for cybersecurity, which will assist them in their future endeavors.

  • Students
  • Developers
  • Managers
  • Engineers
  • Private citizens

will benefit from this learning experience. Personalized interviews with industry partners are included to connect cybersecurity concepts with relevant business experiences.

Applied Learning Project

Quizzes and projects for the Introductory Cybersecurity course are designed to reinforce understanding and recall of the topics studied. The emphasis is on fundamental topics, not just memorizing facts.

  • The goal is to help learners develop proper habits in assessing and improving the cyber situation in real computing systems, networks, and software.
  • Authentic scenarios are included based on practical corporate and infrastructure deployments to enhance the learning experience.

Details of the courses that make up the specialization

Introduction to Cyber ​​Attacks

  • Course 1 • 18 hours • 4.7 (2,833 ratings)

Course Details

What you’ll learn

This course provides students with a basic understanding of common threats, vulnerabilities, and risks in the field of cybersecurity. The course includes an overview of how basic cyber attacks are constructed and targeted against real systems. Examples include:

  • Simple cases of vulnerabilities in the Unix kernel
  • Internet worms
  • Trojan horses in software

Network attacks such as:

  • Distributed Denial of Service (DDOS) attacks
  • Botnet attacks

are described and illustrated with real-world examples from the past few decades. Familiar analytical models such as the CIA Security Threat Framework (Confidentiality/Integrity/Availability) are introduced, and examples demonstrate how different types of threats can harm real assets. The course also includes an introduction to basic cybersecurity risk analysis, with an overview of how threat-asset matrices can be used to prioritize risk decisions. Threats, vulnerabilities, and attacks are examined and mapped in the context of systems security engineering methodologies.

Skills you will acquire
  • Category: Cyber ​​Security
  • Category: Information Security (INFOSEC)
  • Category: Denial of Service (DOS) attack
  • Category: Risk Assessment

Ways to respond to cyber attacks

  • Course 2 • 19 hours • 4.7 (688 ratings)

Course Details

What you’ll learn

This course introduces the fundamentals of cybersecurity, starting with fundamental models such as Bell-LaPadula and information flow frameworks. These basic policy enforcement mechanisms help introduce basic functional defenses, starting with authentication methods. Students will be introduced to a range of different authentication solutions and protocols, including RSA SecureID and Kerberos, in the context of a canonical scheme. The course will also include an introduction to the basics of cryptography, with an emphasis on regular ciphers and public-key cryptography. Important cryptographic techniques such as block chaining and triple-DES are explained. Modern cryptographic backends in certificate services are discussed and how they support secure e-commerce using SSL schemes.

Skills you will acquire
  • Category: Cyber ​​Security
  • Category: Cryptography
  • Category: Public key cryptography

Detecting and responding to cyber threats in real time

  • Course 3 • 15 hours • 4.7 (635 ratings)

Course Details

What you’ll learn

This course introduces real-time cybersecurity techniques and methods in the context of TCP/IP protocols. An explanation of some of the basic TCP/IP hacks is used to clarify the need for network security solutions such as stateless and stateful firewalls. Students will be exposed to techniques used in the design and configuration of firewall solutions such as packet filters and proxies to protect organizational assets.

Perimeter solutions such as firewalls and intrusion prevention systems present significant shortcomings in common enterprise environments. The result of these weaknesses can sometimes manifest as advanced persistent threats (APTs) from state-sponsored actors. Such attacks, such as DDOS and third-party attacks, point to potential solutions for modern organizations.

Organizational and infrastructure security

  • Course 4 • 14 hours • 4.7 (630 ratings)

Course Details

What you’ll learn

This course introduces a series of advanced and current topics in cybersecurity, many of which are particularly relevant in the context of modern enterprises and infrastructures. The fundamentals of enterprise compliance frameworks are introduced, with an introduction to NIST and PCI. Hybrid cloud architecture offers an opportunity to fix most of the weaknesses in the security of modern on-premises networks.

Emerging security topics in blockchain, disruptive algorithms, the Internet of Things (IoT), and critical infrastructure protection are also described in the context of cyber risks. Resilient approaches to mobile security and cloud security are also presented. The course concludes with some practical tips for students on how to plan a career in cybersecurity.