Sobre este Programa de cursos integrados

17,199 visualizações recentes

This specialization in intended for IT professionals, computer programmers, managers, IT security professionals who like to move up ladder, who are seeking to develop network system security skills. Through four courses, we will cover the Design and Analyze Secure Networked Systems, Develop Secure Programs with Basic Cryptography and Crypto API, Hacking and Patching Web Applications, Perform Penetration Testing, and Secure Networked Systems with Firewall and IDS, which will prepare you to perform tasks as Cyber Security Engineer, IT Security Analyst, and Cyber Security Analyst.

The learning outcomes of this specialization include:

you should be able to create public/private keys, certificate requests, install/sign/verify them for web server and client authentication, secure emails, and code signing.

you should be able to write secure web apps with Crypto API to implement the confidentiality, integrity, and availability basic security services.

you should be able to hack web applications with vulnerabilities and patch them.

you should be able to apply penetration testing tool to exploit vulnerable systems.

you should be able to crack passwords given the hashes in password file using AWS P2 GPU.

you should be able to configure firewall and IDS for secure network systems

you should be able to specify effective security policies and implement efficient enforcement procedures by applying security design principles for securing network systems.

Certificados compartilháveis
Tenha o certificado após a conclusão
Cursos 100% on-line
Comece imediatamente e aprenda em seu próprio cronograma.
Cronograma flexível
Definição e manutenção de prazos flexíveis.
Nível intermediário
Aprox. 4 meses para completar
4 horas/semana sugeridas
Inglês
Legendas: Inglês
Certificados compartilháveis
Tenha o certificado após a conclusão
Cursos 100% on-line
Comece imediatamente e aprenda em seu próprio cronograma.
Cronograma flexível
Definição e manutenção de prazos flexíveis.
Nível intermediário
Aprox. 4 meses para completar
4 horas/semana sugeridas
Inglês
Legendas: Inglês

Este Programa de cursos integrados contém 4 cursos

Curso1

Curso 1

Design and Analyze Secure Networked Systems

3.7
estrelas
128 classificações
42 avaliações
Curso2

Curso 2

Basic Cryptography and Programming with Crypto API

4.0
estrelas
34 classificações
8 avaliações
Curso3

Curso 3

Hacking and Patching

3.9
estrelas
135 classificações
34 avaliações
Curso4

Curso 4

Secure Networked System with Firewall and IDS

3.8
estrelas
28 classificações
7 avaliações

oferecido por

Logotipo de Sistema de Universidades do ColoradoUniversidade do Colorado

Sistema de Universidades do ColoradoUniversidade do Colorado

Perguntas Frequentes – FAQ

  • If you subscribed, you get a 7-day free trial during which you can cancel at no penalty. After that, we don’t give refunds, but you can cancel your subscription at any time. See our full refund policy.

  • Yes! To get started, click the course card that interests you and enroll. You can enroll and complete the course to earn a shareable certificate, or you can audit it to view the course materials for free. When you subscribe to a course that is part of a Specialization, you’re automatically subscribed to the full Specialization. Visit your learner dashboard to track your progress.

  • Yes, Coursera provides financial aid to learners who cannot afford the fee. Apply for it by clicking on the Financial Aid link beneath the "Enroll" button on the left. You'll be prompted to complete an application and will be notified if you are approved. You'll need to complete this step for each course in the Specialization, including the Capstone Project. Learn more.

  • When you enroll in the course, you get access to all of the courses in the Specialization, and you earn a certificate when you complete the work. If you only want to read and view the course content, you can audit the course for free. If you cannot afford the fee, you can apply for financial aid.

  • This course is completely online, so there’s no need to show up to a classroom in person. You can access your lectures, readings and assignments anytime and anywhere via the web or your mobile device.

  • 16 weeks.

  • Know one high level programming language, basic Unix system commands, and discrete mathematics in particular the number theory.

  • Yes. MOOC1 covers security design principles and concepts. Learning it first will help understand basic security terms which are used in other MOOCs and how the principles and basic security services are applied in various situations. MOOC2 helps the learners understanding the basic cryptography and related crypto API to create secure web app. These knowledge help learners assess the hacking and patching skill/tools needed in MOOC3. MOOC4 should be done last since it integrates all cyber security knowledge to implement security policies and their enforcement procedures for hardening a networked systems.

  • At this time, this Specialization is not credit bearing. At a future time, this content may contribute in part towards university credit. Please note that additional costs and requirements may be entailed once credit is offered.

  • You should be able to create public/private keys, certificate requests, install/sign/verify them for web server and client authentication, secure emails, and code signing.

    You should be able to write secure web apps with Crypto API to implement the confidentiality, integrity, and availability basic security services.

    You should be able to hack web applications with Command Injection and SQL Injection vulnerabilities and patch them.

    You should be able to apply penetration testing tool to exploit vulnerable systems.

    You should be able to use hashcat softare and AWS P3 GPU to crack passwords using dictionary attacks and mask patterns.

    You should be able to configure firewall and IDS for secure network systems using AWS VPCs.

    You should be able to specify effective security policies and implement efficient enforcement procedures by applying security design principles for securing network systems.

Mais dúvidas? Visite o Central de Ajuda ao Aprendiz.