YoVDO

Real-Time Cyber Threat Detection and Mitigation

Offered By: New York University (NYU) via Coursera

Tags

Network Security Courses Intrusion Detection Courses DDoS Attacks Courses Advanced Persistent Threats Courses

Course Description

Overview

This course introduces real-time cyber security techniques and methods in the context of the TCP/IP protocol suites. Explanation of some basic TCP/IP security hacks is used to introduce the need for network security solutions such as stateless and stateful firewalls. Learners will be introduced to the techniques used to design and configure firewall solutions such as packet filters and proxies to protect enterprise assets. Perimeter solutions such as firewalls and intrusion prevention systems are shown to have significant drawbacks in common enterprise environments. The result of such weakness is shown to often exist as advanced persistent threats (APTs) from nation-state actors. Such attacks, as well as DDOS and third-party attacks, are shown to have potential solutions for modern enterprise.

Syllabus

  • Basic Network Security
    • This module introduces the basics of TCP/IP for security, including firewall design and use.
  • More Advanced Network Security Technologies
    • This module introduces packet filters, firewall rule sets, proxies, and additional network security methods.
  • Network Security Architectures
    • This module introduces the foundations firewall architectures, intrusion detection, and SOC design.
  • Enterprise Network Security
    • This module introduces the limitations of perimeters, and the challenges in the enterprise of dealing with threats such as DDOS and APT.

Taught by

Dr. Edward G. Amoroso

Tags

Related Courses

Ciberseguridad: ataques y contramedidas
Universidad Rey Juan Carlos via Independent
Fundamentos de Ciberseguridad: un enfoque práctico
Inter-American Development Bank via edX
Cyber Security Advanced Persistent Threat Defender Preview
Udemy
Threat Intelligence: Cyber Threats and Kill Chain Methodology
Pluralsight
Cyber Security, Tools, Techniques and Counter Measures
IGNOU via Swayam