- Level Foundation
- Duration 12 hours
- Course by University of Colorado System
-
Offered by
About
Computer attacks and data breaches are inevitable. It seems like every day a data breach occurs and the victims of the data breach suffer. Their information is stolen or posted online. The company's or businesses who had the breach go on, learn a little from the attack, and just give credit monitoring out as if nothing happened. What if you could help prevent a data breach in your organization? This is the third course in the Practical Computer Security specialization. This course looks at detection and mitigation of threats and attack vectors and discusses how to use tools and principles to protect information. By the end of the course you should be able to make suggestions on what type of detection and mitigation strategy is right for your systems or business given the known threats and attack vectors. You should be able to discuss what features you want in a firewall, or how cash registers or sensitive data systems should be secured. The project at the end of the course will allow you to apply what you have learned to argue what type of detection and mitigation strategies should have been employed by companies and businesses that have suffered a data breach.Modules
Introduction
2
Videos
- Introduction
- About the Instructor
2
Readings
- About this course
- Get help and meet other learners. Join your Community!
Week 1: Firewalls
2
Assignment
- Practice Quiz - Week 1
- Week 1 - Firewalls - the gatekeeper
1
Discussions
- Stop blaming the firewall!
3
Videos
- Firewall basics
- Advanced firewalls
- Types of firewall configurations
1
Readings
- Lecture Slides
Intrusion Detection and Prevention
2
Assignment
- Practice Quiz - Week 2
- Week 2 - Intrusion Detection and Prevention
1
Discussions
- Intrusion Detection and Prevention
3
Videos
- Detection Methods
- Intrusion Detection Systems
- Intrusion Prevention Systems
3
Readings
- Intrusion Detection Readings
- Honeypots
- Lecture Slides
Tools
2
Assignment
- Practice Quiz - Week 3
- Week 3 - Detection and Prevention Tools
1
Discussions
- What do you use?
4
Videos
- Anti-Virus/Anti-Malware
- Snort
- HIDs and HIPs
- Splunk
3
Readings
- Splunk and Security
- Understanding IPS vs. IDS
- Lecture Slides
Attacks are inevitable! A case study from UCCS
2
Assignment
- Practice Quiz - Week 4
- Week 4 - Real World Attacks
1
Discussions
- What do you think?
4
Videos
- Attacks are inevitable - Prepare
- Before the Attack
- During the Attack
- After the Attack
2
Readings
- The Incident Handlers Handbook
- Case Study - The Target Breach
Week 5: Project - Research on major breaches
1
Peer Review
- Understanding that data breaches happen every day
1
Videos
- How data breaches are exposed
Auto Summary
Join this foundational course on Coursera, led by expert instructors, to master the detection and mitigation of cyber threats and attacks. Over 720 minutes, you’ll explore tools and principles essential for protecting information, evaluate firewall features, and secure sensitive data systems. Ideal for IT and Computer Science enthusiasts, the course concludes with a practical project analyzing real-world data breaches. Available with a Starter subscription, it's perfect for anyone aiming to enhance their cybersecurity skills.

Greg Williams