- Level Professional
- Duration 8 hours
- Course by EIT Digital
-
Offered by
About
The course targets individuals planning to develop a career in cybersecurity, middle managers and executives. The course covers the following main learning objectives: Threats - Technology - Economics and it is structured in 2 parts: an online part and a face-to-face/live webinar part. The present online course is designed to cover theoretical concepts a Cybersecurity Consultant (medium level) should know. It is structured in 4 modules and is aimed at being finished in about 3-4 weeks-time. The course contains a set of quizzes with a pass mark of 60%. Learners interested to get the certificate should pass all the quizzes and get a total score of 70% or above. The learners finalizing the online module could develop further their knowledge and skills by attending a face-to-face / live webinar during which the theoretical concepts will be further developed via case studies and hands on exercises. More information on the webinar could be found at https://professionalschool.eitdigital.eu/cybersecurity-consultant. By finalizing this course and attending the face-to-face /live webinar complementary module you will acquire the knowledge and develop the skills needed in view of applying for the Cybersecurity Consultant Skills Certification Scheme (C3 by CONCORDIA) ran in conjunction to this course. More information could be found at https://www.concordia-h2020.eu/becoming-a-cybersecurity-consultant/. Except otherwise noted, the reuse of these presentations/videos is authorized under the Creative Commons Attribution 4.0 International (CC BY 4.0) license (https://creativecommons.org/licenses/by/4.0/). This means that reuse is allowed provided appropriate credit is given and any changes are indicated. For any use or reproduction of material that is not owned by the CONCORDIA partner providing the respective course, permission must be sought directly from the copyright holders. The course Becoming Cybersecurity Consultant was developed as part of the CONCORDIA project, and it is a joint effort of the following partners: University of Milan, University of Lorraine, University of Zurich, University of Insubria, Industrial Systems Institute Athens, Bitdefender, TUV IT Austria, EIT Digital. The CONCORDIA project is funded from the European Union’s Horizon 2020 Research and Innovation program under Grant Agreement No 830927.Modules
The Cybersecurity Consultant role profile
1
Videos
- The Cybersecurity Consultant Role profile
CIA Triad and Security Principles
1
Assignment
- CIA Triad and Security principles
4
Videos
- Introduction and basic terminology
- CIA triad & additional security properties
- Security Attacks and Threats
- Security Services and Security Mechanisms
Privacy Principles to Manage Risks Related to Data
1
Assignment
- Privacy principles
4
Videos
- Introduction to privacy preserving data management
- Privacy-preserving DBMSs
- Privacy-preserving data sharing
- Anonymization techniques and related utility measures
Risk Assessment
1
Assignment
- Principles of Risk Management
2
Videos
- Principles of Risk Management, Module 1
- Principles of Risk Management, Module 2
Attacks Capabilities and Attacks Stages
2
Assignment
- Cybersecurity lifecycle: Before the attack
- Cyberattack lifecycle: During and After the Attack
4
Videos
- Introduction
- Cyberattack lifecycle: Before the Attack
- Cyberattack lifecycle: During the Attack
- Cyberattack lifecycle: After the Attack
Emerging Security Issues and Evolving Attacks
1
Assignment
- Emerging Security Issues and Evolving Attacks
3
Videos
- Introduction
- Recent attacks
- Key Findings
Network Attacks
1
Assignment
- Overview of Network attacks
2
Videos
- Overview of Network attacks, Module 1
- Overview of Network attacks, Module 2
Internet Technology: Definition, Principles and Top Threats
3
Assignment
- Cloud Quiz
- SDN/NFV Quiz
- IoT Quiz
7
Videos
- Introduction
- Cloud Technology
- Cloud Top Threats
- SDN/NFV Technology
- SDN/NFV Top Threats
- IoT Technology
- IoT Top Threats
The Security by design Principle Approaches and Paradigms
2
Assignment
- Security by Design Quiz
- Security Design Principles
3
Videos
- Introduction and Secure Development Lifecycle
- Secure Design Good Practices
- Secure Design Principles
Vulnerability Management Methods
3
Assignment
- Black-Box Methods
- Grey-Box Methods
- White-Box Methods
4
Videos
- Introduction
- Black-Box Methods
- Grey-Box Methods
- White-Box Methods
Network Protection Methods
2
Assignment
- Overview of Network Protection Methods
- IDS and SIEM quiz
2
Videos
- Overview of Network Protection Methods
- IDS and SIEM
OS/Application Protection Methods
1
Assignment
- Application/OS Protection Methods Quiz
1
Videos
- OS/Application Protection Methods
Data Protection and Security
1
Assignment
- Data Protection and Security
4
Videos
- Introduction
- Basic Data Concepts
- Economic Aspects
- Defenses
Risk Management with an Economic Bias
1
Assignment
- Cybersecurity economics
3
Videos
- Introduction and Motivation
- Cybersecurity Economics
- Gordon Loeb Model (GL) and Return On Security Investment (ROSI)
Auto Summary
Embark on a transformative journey into the world of cybersecurity with the "Becoming a Cybersecurity Consultant" course offered by Coursera. This program is meticulously designed for aspiring cybersecurity professionals, middle managers, and executives looking to deepen their expertise in the field. Focused on critical areas such as Threats, Technology, and Economics, this course provides a robust theoretical foundation necessary for a medium-level Cybersecurity Consultant. Developed through a collaboration of prestigious institutions and industry leaders, including the University of Milan, University of Lorraine, and Bitdefender, this course is backed by the European Union’s Horizon 2020 Research and Innovation program. Spanning approximately 3-4 weeks, the program is divided into four comprehensive modules. Learners will engage with interactive content, including quizzes that require a 60% pass mark, and must achieve a total score of 70% or above to earn a certificate of completion. The course's content is available under the Creative Commons Attribution 4.0 International license, allowing you to reuse the material with proper credit and indication of any changes. Subscription options include Starter and Professional tiers, catering to different levels of commitment and expertise. Join now to become a proficient cybersecurity consultant and safeguard the digital world.

Marco Anisetti
Barbara Carminati

Muriel Figueredo Franco
Apostolos P. Fournaris
Argyro Chatzopoulou
Remi Badonnel

Elena Ferrari
Dumitru Bogdan PRELIPCEAN
Lama Sleem

Eder John Scheid