- Level Professional
- Duration 15 hours
- Course by New York University
-
Offered by
About
This course introduces a series of advanced and current topics in cyber security, many of which are especially relevant in modern enterprise and infrastructure settings. The basics of enterprise compliance frameworks are provided with introduction to NIST and PCI. Hybrid cloud architectures are shown to provide an opportunity to fix many of the security weaknesses in modern perimeter local area networks. Emerging security issues in blockchain, blinding algorithms, Internet of Things (IoT), and critical infrastructure protection are also described for learners in the context of cyber risk. Mobile security and cloud security hyper-resilience approaches are also introduced. The course completes with some practical advice for learners on how to plan careers in cyber security.Modules
Module 1
12
Videos
- Introduction: What You Will Learn from This Course on Cyber Security
- Assignments and Reading
- Social Engineering
- Phishing
- Security Awareness
- Using Video for Security Awareness
- Security Assessment and Audit
- What is GRC?
- NIST Framework Overview
- PCI-DSS Framework Overview
- Challenges of Compliance versus Security
- Welcome Roger Thornton (Part 1): CTO, AlienVault
Module 1 Assignments
1
Assignment
- Module 1 Quiz
4
Readings
- Required: “Framework for Improving Critical Infrastructure Cybersecurity,” Version 1.0, NIST, Feb 12, 2014.
- Video: “Addressing the Challenges of Complying with the Payment Card Industry Data Security Standard,” HALOCK Security Labs – Introduction to PCI Compliance
- Video: “Closing Keynote – The Past, Present, and Future of Integrated GRC,” French Caldwell, MetricStream
- Suggested: Introduction to Cyber Security, Edward Amoroso and Matthew Amoroso, eBook available online (Chapters 25 - 26)
Module 2
10
Videos
- Assignments and Reading
- Enterprise Shift to Hybrid Cloud
- Workload Micro-Segmentation
- Defense in Depth through Micro-Segmentation
- Cloud Access Security Brokers
- Advanced Hybrid Cloud Security Architecture (Part 1)
- Advanced Hybrid Cloud Security Architecture (Part 2)
- Advanced Hybrid Cloud Security Architecture (Part 3)
- Security of Isolated Servers (Outside Perimeter)
- Welcome John Popolizio: Founder, Riverdale Group
Module 2 Assignments
1
Assignment
- Module 2 Quiz
2
Readings
- Required: “Practical Methods for Securing the Cloud,” IEEE, Ed Amoroso, 2014
- Suggested: Introduction to Cyber Security, Edward Amoroso and Matthew Amoroso, eBook available online (Chapters 27 - 28)
Module 3
10
Videos
- Assignments and Reading
- Hashing Algorithms
- Blockchain - Part 1
- Blockchain - Part 2
- Cyber Attribution
- Onion Routing and Tor
- Chaum Binding Algorithm
- Critical Infrastructure - Part 1 - Requirements
- Critical Infrastructure - Part 2 - Protection Methods
- Welcome Roger Thornton (Part 2): CTO, AlienVault
Module 3 Assignments
1
Assignment
- Module 3 Quiz
4
Readings
- Required: “Bitcoin: A Peer-to-Peer Electronic Cash System,” S. Nakamoto
- Required: “Common Threats and Vulnerabilities of Critical Infrastructures,” Robles, Choi, Cho, Kim, Park, and Lee, Dongseo University, Korea. International Journal of Control and Automation.
- Video: “HDIAC Critical Infrastructure Protection Webinar,” Benjamin Ruddell, Arizona State University, 2015
- Suggested: Introduction to Cyber Security, Edward Amoroso and Matthew Amoroso, eBook available online (Chapters 29 - 30)
Module 4
9
Videos
- Assignments and Reading
- Mobility Security
- IMSI Catching
- IoT Security
- IoT Botnets
- Using Deception and Honey Pots for Security
- Welcome Elena Kvochko, Cyber Security Expert
- Advice on Careers in Cyber Security
- How to Continue a Learning Plan in Cyber Security
Module 4 Assignments
1
Assignment
- Module 4 Quiz
3
Readings
- Required: “Anonymous Connections and Onion Routing,” Michael Reed, Paul Syverson, and David Goldschlag, onion-router.net.
- Required: “Cyber Security Deception,” Mohammed Almeshekah and Eugene Spafford, Springer.com
- Video: “Kevin Mahaffey – Lookout – Mobile Security,”
Final Quiz: Researching Security Solutions for a Typical Enterprise Archiecture
1
Assignment
- Multiple Choice Questions
2
Readings
- Project Description
- Additional Self-Study
Auto Summary
Uncover the intricacies of modern cyber security with the "Enterprise and Infrastructure Security" course, tailored for IT and computer science professionals. Guided by Coursera, this comprehensive program delves into advanced topics essential for safeguarding contemporary enterprise and infrastructure environments. It covers critical areas such as enterprise compliance frameworks, including NIST and PCI, and explores the potential of hybrid cloud architectures to enhance security in local area networks. Participants will gain insights into emerging security challenges involving blockchain, blinding algorithms, the Internet of Things (IoT), and critical infrastructure protection. The course also addresses mobile security and hyper-resilience strategies for cloud security, ensuring a well-rounded understanding of current cyber risks. Spanning 900 minutes of in-depth content, this professional-level course is available through Starter and Professional subscription plans, making it accessible for both newcomers and seasoned professionals aiming to advance their careers in cyber security. Join us to navigate the evolving landscape of cyber threats and fortify your expertise in enterprise and infrastructure security.

Dr. Edward G. Amoroso