YoVDO

Cybersecurity

Offered By: Rochester Institute of Technology via edX

Tags

Cybersecurity Courses Network Security Courses Risk Analysis Courses Forensics Courses Vulnerability Assessment Courses

Course Description

Overview

Gain the essential knowledge and expertise in network security and forensics needed for cybersecurity in enterprise environments.

In this Cybersecurity MicroMasters program, you will learn:

  • Fundamentals of networks;
  • Systems administration;
  • How to protect computer networks and other systems by mitigating vulnerabilities and monitoring intrusions;
  • How to perform digital forensic analysis of cybercrime by gathering information on the nature and extent of the attack for presentation in a court of law, as well as assessing the extent of the damage to an organization;
  • Techniques of risk analysis;
  • Risk assessment and vulnerability assessment.


Syllabus

Courses under this program:
Course 1: Cybersecurity Fundamentals

Learn cybersecurity fundamentals, including how to detect threats, protect systems and networks, and anticipate potential cyber attacks.



Course 2: Computer Forensics

Learn the process, techniques and tools for performing a digital forensics investigation to obtain data related to computer crimes.



Course 3: Cybersecurity Risk Management

Learn key principles of risk analysis, risk assessment and risk mitigation for information security using both qualitative and quantitative methodologies.



Course 4: Network Security

Learn the process of network security, including intrusion detection, evidence collection, network auditing, and contingency planning against attacks.




Courses

  • 24 reviews

    8 weeks, 10-12 hours a week, 10-12 hours a week

    View details

    In this introduction to the field of computing security, you will be given an extensive overview of the various branches of computing security. You will learn cybersecurity concepts, issues, and tools that are critical in solving problems in the computing security domain.

    You will have opportunities to learn essential techniques in protecting systems and network infrastructures, analyzing and monitoring potential threats and attacks, devising and implementing security solutions for organizations large or small.

    This offering is part of the RITx Cybersecurity MicroMasters Program that prepares students to enter and advance in the field of computing security.

  • 1 review

    8 weeks, 10-12 hours a week, 10-12 hours a week

    View details

    Cybersecurity risk management guides a growing number of IT decisions. Cybersecurity risks continue to have critical impacts on overall IT risk modeling, assessment and mitigation.

    In this course, you will learn about the general information security risk management framework and its practices and how to identify and model information security risks and apply both qualitative and quantitative risk assessment methods. Understanding this framework will enable you to articulate the business consequences of identified information security risks. These skills are essential for any successful information security professional.

    The goal of this course is to teach students the risk management framework with both qualitative and quantitative assessment methods that concentrate on the information security (IS) aspect of IT risks. The relationship between the IT risk and business value will be discussed through several industry case studies.

    First, you will learn about the principles of risk management and its three key elements: risk analysis, risk assessment and risk mitigation. You will learn to identify information security related threats, vulnerability, determine the risk level, define controls and safeguards, and conduct cost-benefit analysis or business impact analysis.

    Second, we will introduce the qualitative and quantitative frameworks and discuss the differences between these two frameworks. You will learn the details of how to apply these frameworks in assessing information security risk.

    Third, we will extend the quantitative framework with data mining and machine learning approaches that are applicable for data-driven risk analytics. You will explore the intersection of information security, big data and artificial intelligence.

    Finally, you will analyze a series of extended case studies, which will help you to comprehend and generalize the principles, frameworks and analytical methods in actual examples.

    This offering is part of the RITx Cybersecurity MicroMasters Program that prepares students to enter and advance in the field of computing security.

  • 1 review

    8 weeks, 10-12 hours a week, 10-12 hours a week

    View details

    Digital forensics involves the investigation of computer-related crimes with the goal of obtaining evidence to be presented in a court of law.

    In this course, you will learn the principles and techniques for digital forensics investigation and the spectrum of available computer forensics tools. You will learn about core forensics procedures to ensure court admissibility of evidence, as well as the legal and ethical implications. You will learn how to perform a forensic investigation on both Unix/Linux and Windows systems with different file systems. You will also be guided through forensic procedures and review and analyze forensics reports.

    This offering is part of the RITx Cybersecurity MicroMasters Program that prepares students to enter and advance in the field of computing security.

  • 1 review

    8 weeks, 10-12 hours a week, 10-12 hours a week

    View details

    The Cybersecurity Capstone is specifically designed to provide a platform for verified learners to practice the hands-on cybersecurity skills and techniques studied in the courses of the RITx Cybersecurity MicroMasters program. It also includes the evaluation of the competencies and performance tasks that enable professional cybersecurity success.

    Before enrolling in the Cybersecurity Capstone, you must successfully complete and pass the four courses in the RITx Cybersecurity MicroMasters program as a verified learner. Upon successful completion of the Cybersecurity Capstone, you will receive the Cybersecurity MicroMasters certificate.

    During the Cybersecurity Capstone, you will perform a set of hands-on lab exercises in a web-based virtual lab environment. Below are the requirements to successfully access the virtual lab environment:

    • Access to a laptop or desktop computer
    • A modern web browser with Javascript enabled
    • A fast internet connection

    The areas of hands-on lab activities include, but are not limited to:

    • basic systems and network services such as firewall, DNS, DHCP, Wireshark
    • digital forensics investigation with tools such as Encase, FTK, and Volatility Framework
    • network security related tools such as port scanning, Snort, and Metasploit, etc.

    You will be assessed by answering questions and uploading results based on hands-on lab activities completed in the web-based virtual lab environment. Assessment questions are within the edX platform.


Taught by

Bo Yuan, Jonathan S. Weissman, Yin Pan and Tong Sun

Tags

Related Courses

Introduction to Criminology
University of Hull via FutureLearn
Cyber Incident Response
Infosec via Coursera
Cyber Security in Manufacturing
University at Buffalo via Coursera
Cybersecurity Fundamentals
Rochester Institute of Technology via edX
Cyber Incident Response
Infosec via Coursera