- Level Foundation
- المدة 11 ساعات hours
- الطبع بواسطة University of Colorado System
-
Offered by
عن
I've heard this before " "I'm not sure my computer security practices are working". I reply "Have you tested them?" This course is the fourth and final course in the Practical Computer Security specialization. In this course, you'll learn how to proactively test what you have put in place to protect your data. In the first week you'll be able to discuss the basics of deterrents and how to "trick" attackers into believing they've hit a goldmine of data away from your real systems. In week 2, you'll be able to understand and discuss the steps of penetration testing methodology. In week 3, you will be able to understand and apply what you have learned on your own systems to test whether your systems are secure or not. In week 4, we'll discuss planning for your own methodology that you can apply to your own systems. And finally in week 5, we'll finish up with a project that will allow you to test your skills in a safe environment.الوحدات
Introduction
2
Videos
- Introduction
- About the Instructor
2
Readings
- About this course
- Get help and meet other learners. Join your Community!
Week 1: Information Sharing
2
Assignment
- Practice Quiz - Week 1
- Week 1: Information Sharing
1
Discussions
- Information Sharing
1
Videos
- Information sharing
3
Readings
- Threat Intelligence
- Resources for building your own testing environment
- Lecture Slides
Week 2: Penetration Testing - Methodology
2
Assignment
- Practice Quiz - Week 2
- Week 2 - Methodology
1
Discussions
- Methodology
5
Videos
- "Warning - only try this at home, or with written permission"
- Penetration Testing
- Intelligence Gathering
- Vulnerability Scanning
- Exploitation
2
Readings
- Resources to help you further your skills
- Lecture Slides
Week 3: Hacking yourself - Tools
2
Assignment
- Practice Quiz - Week 3
- Week 3 - Penetration Testing Tools
1
Discussions
- Which tools?
3
Videos
- Nmap
- Nessus
- Metasploit
2
Readings
- Creating your own lab
- Pen Testing Distributions
Week 4: Effective Management of Computer Security
2
Assignment
- Practice Quiz - Week 4
- Week 4 - Effective computer security management
1
Discussions
- Legal issues?
4
Videos
- Record keeping
- Legal issues
- Where to turn if you have an incident
- Where do i go from here?
3
Readings
- University of Colorado Security Program - Required
- Lecture Slides
- GDPR - Privacy
Week 5: Project - Hands on
1
Peer Review
- Mutillidae
1
Videos
- Mutillidae
2
Readings
- Usage Instructions
- Mutillidae Whitepaper
Auto Summary
"Proactive Computer Security" is an essential course for anyone in the IT and Computer Science field looking to enhance their data protection strategies. As the fourth and final installment in the Practical Computer Security specialization, this course offers a comprehensive approach to proactively testing and improving your security measures. Throughout the 660-minute duration, participants will delve into a variety of critical topics. In the first week, you'll explore deterrents and tactics to mislead attackers. Week 2 covers the methodology of penetration testing, providing a solid foundation for understanding security vulnerabilities. By week 3, you'll apply these concepts to your own systems, ensuring their robustness. Week 4 focuses on creating a personalized testing methodology, and the course culminates in week 5 with a hands-on project to practice your new skills in a controlled environment. Led by Coursera, this foundational-level course offers flexible subscription options, including Starter, Professional, and Paid plans, making it accessible to a wide audience. Whether you're an IT professional or a computer science enthusiast, "Proactive Computer Security" equips you with the tools and knowledge to safeguard your digital assets effectively.

Greg Williams