Proactive Computer Security
I’ve heard this before – “I’m not sure my computer security practices are working”. I reply “Have you tested them?” This course is the fourth and final course in the Practical Computer Security specialization. In this course, you’ll learn how to proactively test what you have put in place to protect your data. In the first week you’ll be able to discuss the basics of deterrents and how to “trick” attackers into believing they’ve hit a goldmine of data away from your real systems. In week 2, you’ll be able to understand and discuss the steps of penetration testing methodology. In week 3, you will be able to understand and apply what you have learned on your own systems to test whether your systems are secure or not. In week 4, we’ll discuss planning for your own methodology that you can apply to your own systems. And finally in week 5, we’ll finish up with a project that will allow you to test your skills in a safe environment.
None
Syllabus
Syllabus - What you will learn from this course
Week 1
Information Sharing and Threat Intelligence
Week 2
Penetration Testing - Methodology
Week 3
Common Pen Testing Tools
Week 4
Proactive computer security management
Week 5
Exploiting OWASP Top 20 Controls
FAQ
When will I have access to the lectures and assignments?
Access to lectures and assignments depends on your type of enrollment. If you take a course in audit mode, you will be able to see most course materials for free. To access graded assignments and to earn a Certificate, you will need to purchase the Certificate experience, during or after your audit. If you don't see the audit option:
What will I get if I subscribe to this Specialization?
When you enroll in the course, you get access to all of the courses in the Specialization, and you earn a certificate when you complete the work. Your electronic Certificate will be added to your Accomplishments page - from there, you can print your Certificate or add it to your LinkedIn profile. If you only want to read and view the course content, you can audit the course for free.
Is financial aid available?
Yes. In select learning programs, you can apply for financial aid or a scholarship if you can’t afford the enrollment fee. If fin aid or scholarship is available for your learning program selection, you’ll find a link to apply on the description page.
Reviews
Very informative and instructive course. It's also the most challenging part of the course.
This course was an excellent introduction and overview of what security professionals face. I am non-technical and had only limited difficulty with a small portion of the materials.
One of the best course in the field of cyber security. One should must enroll for this if he/she interested in computer security.
Class doesn't seem very active-- not a lot of students so I had to wait awhile for peer reviewed assignments to get reviewed, but the content is great.