YoVDO

Cyber Security – Technology and Governance

Offered By: University of London via Coursera

Tags

Cybersecurity Courses Network Security Courses Governance Courses Cybercrime Courses IT Governance Courses Security Management Courses

Course Description

Overview

Save Big on Coursera Plus. 7,000+ courses at $160 off. Limited Time Only!
This specialisation covers topics ranging from the security of computer system and networks, to the key role of human aspects in cybercrime. You will learn fundamental concepts related to computer system core components and how computers work, then extend this to consider a variety of topics from hardware to applications. Aspects of cybercriminal activity are explained in topics such as social engineering, arguably the most important attack vector in cybercrime, and the range of actors related to cybercrime: the criminals, the victims, and law enforcement. Finally, you will be presented with some of the key components of practical cyber security management and its governance. This includes what happens when things go wrong, understanding how organisations can respond to incidents, through to the essential role of people in achieving better cyber security outcomes.

Syllabus

Course 1: Introduction to Computer Security
- The purpose of this short four-week course is to introduce the topic of computer system security. We initially look at a short basic ... Enroll for free.

Course 2: Introduction to Network Security
- The security of computer networks is a key element in cyber security. Computer networking provides the foundational connectivity services ... Enroll for free.

Course 3: Security Management and Governance
- In this course you will look at some of the key components of practical cyber security management and its governance. This includes what ... Enroll for free.

Course 4: Cybercrime
- This course introduces fundamental notions of cybercrime. Namely, what cybercrime is, the main questions surrounding cybercrime, how ... Enroll for free.


Courses

  • 0 reviews

    1 day 17 hours 6 minutes

    View details
    The purpose of this short four-week course is to introduce the topic of computer system security. We initially look at a short basic introduction to computer system core components and functions and then extend this to consider a variety of topics from hardware to applications. Throughout we provide pointers to openly available materials for background and further reading to explore the topics. We refer to the Cyber Security Body of Knowledge (CyBOK) as a reference for cyber security knowledge, alongside other sources that are widely available. In total, we have four weeks that cover this introduction to computer systems and security. No prior programming nor advanced mathematical knowledge Is required. There are a few examples of pseudocode and some basic computer logic (AND, OR, XOR, etc.) in our Week 1 Introduction to computer systems, but these are not essential to completing the course. In other lessons, we introduce basic concepts and provide pointers to online resources. The course includes active learning through four lab sessions. The first lab introduces the Linux operating system in general by exploring the Linux desktop and applications provided in the Coursera lab environment hosted in the AWS cloud. The second lab looks at the Linux command line and explores some of the file system and gathers system information, for example to explore processes. The third lab explores the network information, the system connectivity, and uses some Python scripts and Wireshark to examine the TCP and UDP transport protocols and the web/HTTP application protocol. Lastly we explore more about the network services using the Nmap tool to explore the network services in the system. The course is designed to provide a wide introduction to computer security, by outlining computer systems, including the operating system, programs, data and networking. We discuss some of the issues in computer security and introduce some of the vulnerabilities and threats as we progress through the four weeks. We include some optional readings and videos from a number of sources, including professional resources and vendor materials for additional study.
  • 0 reviews

    1 day 2 hours

    View details
    The security of computer networks is a key element in cyber security. Computer networking provides the foundational connectivity services that are used for the world wide web, distributed computer applications and services, operations and manufacturing, and national infrastructure. This course provides understanding of key technologies used in computer networks and infrastructure. This includes protocols, computer networks, data centres, operational technologies that form key infrastructure critical to the success of organisations and services from a local to an international scale. The course discusses vulnerabilities and the exploits that target computer networks, systems, and the Internet infrastructure. By the end of this course learners will be able to: 1. Show a systematic understanding of digital networks and their operation, including the OSI 7 layer architecture and the TCP/IP protocol stack. 2. Discuss key security threats and risks faced in computer networks. 3. Demonstrate a critical understanding of network security architecture and design rationale of selected protocols, security technologies and how they are used in practice. 4. Identify attack models and analyse vulnerabilities in protocols, network systems, and applications. 5. Demonstrate how these vulnerabilities may be exploited in practice to penetrate a system.
  • 0 reviews

    20 hours 25 minutes

    View details
    In this course you will look at some of the key components of practical cyber security management and its governance. This includes what happens when things go wrong, understanding how organisations can respond to incidents, through to the essential role of people in achieving better cyber security outcomes. Together, you will examine how incident management, cyber resilience, and developing an effective appreciation of people, not simply as users but as active participants, can enable better cyber security outcomes. The topics covered include: • Identifying what an incident is • Incident preparation, planning, and response • Cyber resilience • The role of people in security management • The building of trust and developing positive cyber security cultures By completing this course, you will learn how to integrate incident management and a rich knowledge of people into a real-world Information Security Management System for an organisation.
  • 1 review

    1 day 1 hour 34 minutes

    View details
    This course introduces fundamental notions of cybercrime. Namely, what cybercrime is, the main questions surrounding cybercrime, how cybercrime can be defined, and how it can be studied. You will learn about the difficulties in measuring the occurrence, the frequency and the impact of cybercrime, and build a scepticism on the reliability and the interpretation of cybercrime reports. You will be introduced to discussion about human aspects of cybercrime, in particular, the actors related to cybercrime, that is, the criminals, the victims, and law enforcement. You will also learn about aspects such as personality, national and organisational culture, security culture, training, and other components which affect cybercriminal activity. Finally, you will dive into what is arguably the most important attack vector in cybercrime, that is, social engineering. You will gain an understanding of how it occurs, which techniques social engineers utilise, and which are the underlying psychological principles which make all of us – as humans – susceptible to social engineering attacks. By the end of the course you should be able to: • Reflect on the main questions related to cybercrime. • Explain the meaning, definitions, importance, and impact of cybercrime. • Assess the reliability and the interpretation of reports and surveys related to cybercrime. • Identify the various classifications of cybercrime, the related threats, and threat actors. • Explain the key role of human aspects in cybercrime. • Differentiate between the various actors involved in cybercrime and their associated perspectives. • Evaluate the underlying psychological principles which make social engineering the most successful attack vector in cybercrime. • Describe how deception and social engineering manifest and how they can be defended against.

Taught by

Andrew Dwyer, Guido Schmitz, Konstantinos Mersinas and Professor Peter Komisarczuk

Tags

Related Courses

Security Principles
(ISC)² via Coursera
A Three-Step Guide to Equitable Makerspaces
FutureLearn
Academia de auditoría en la nube: independencia en la nube (Español LATAM) | Cloud Audit Academy - Cloud Agnostic (Spanish from Latin America)
Amazon Web Services via AWS Skill Builder
Cloud Migration Fundamentals
A Cloud Guru
Cloud Security Fundamentals
A Cloud Guru