

CU Boulder - Cybersecurity for Business Specialization
- Offered byCoursera
Cybersecurity for Business Specialization at Coursera Overview
Duration | 5 months |
Total fee | Free |
Mode of learning | Online |
Difficulty level | Beginner |
Official Website | Explore Free Course |
Credential | Certificate |
Cybersecurity for Business Specialization at Coursera Highlights
- Earn a Certificate of completion from University of Colorado on successful course completion
- Instructor- Greg Williams
- 60% started a new career after completing this specialization
- 40% Got a pay increase or promotion.
- Effort - 2 hours/ week
Cybersecurity for Business Specialization at Coursera Course details
- This course is designed for the security professionals
- Identify risks and learn how to protect systems given real-world system architectures
- Determine what threats and exploits caused the data breaches and also what defense mechanisms would have prevented the breaches
- Use the proactive security knowledge they gained to exploit a live system to show the risks of insecure web applications
- This course is for those who want to understand how to defend computer systems and assets from attackers and other threats. It is also for those who want to understand how threats and attacks are carried out to help better defend their systems. This specialization is designed for senior business leaders to middle management and system administrators, so they can all speak the same language and get a better handle on their organization's security.
Cybersecurity for Business Specialization at Coursera Curriculum
Introduction to Cybersecurity for Business
What is Practical Computer Security
Understand the basics of computer security for business
The CIA Triad
Confidentiality, Integrity and Availability are the cornerstones of security. Do you know how they apply?
Cyber Threats and Attack Vectors
Cyber Threats and Attack Vectors
Network and system based attacks
Cloud Security
Common Vulnerabilities
Data Breaches
Detecting and Mitigating Cyber Threats and Attacks
Introduction and Firewalls
Welcome! This week we'll explore firewalls as they are usually the first line of defense against a threat or attack.
Intrusion Detection and Prevention
Detection and Prevention tools
Attacks are Inevitable - Case Study
Understanding detection and mitigation
Proactive Computer Security
Information Sharing and Threat Intelligence
This module covers information sharing. Information sharing is an important tool to help organizations gather information from others so
Penetration Testing - Methodology
Common Pen Testing Tools
Proactive computer security management
Exploiting OWASP Top 20 Controls