Systems Security
Offered By: Udacity
Course Description
Overview
In this course, you will learn about implementing authentication and authorization You will learn how to build and utilize tools that can alert you to system security breaches and you'll know how to effectively counter them.
Syllabus
- Introduction to Systems Security
- In this lesson, you'll be introduced to the course and what to expect!
- Third Party Vulnerabilities
- In this lesson, you will start learning about third party vulnerabilities and how to protect against them.
- Authentication
- In this lesson, you will learn about password management tools, securing remote access, and encryption.
- Authorization
- In this lesson, you will learn about access control, ownership and permissions, and creating rules and filters.
- Isolation
- In this lesson, you will learn about restricting access, access control, and memory attacks.
- Auditing
- In this lesson, you will learn about logging and monitoring.
- Responding to a Nation-State Cyber Attack
- In this project, you will detect a threat, mitigate it, and harden a system in the aftermath of a nation-state cyber attack.
Taught by
nd698 Abhinav Singh
Related Courses
Information Security and Risk Management in ContextUniversity of Washington via Coursera Designing and Executing Information Security Strategies
University of Washington via Coursera Intro to Information Security
Georgia Institute of Technology via Udacity Information Security and Risk Management: An Overview
University of Washington via Canvas Network Information Security- II
Indian Institute of Technology Madras via Swayam