Learners will identify risks and learn how to protect systems given real world system architectures. Learners will also use their knowledge to assess real world data breaches to determine what threats and exploits caused the data breaches and also what defense mechanisms would have prevented the breaches. Finally, learners will use the proactive security knowledge they gained to exploit a live system to show the risks of insecure web applications.
Cybersecurity for Business Specialization
Discover the practical side of computer security. Identify what threatens your business and master how to practically defend against those threats.
About This Specialization
It seems anymore that you can't listen to the news without hearing of a data breach. You may have heard it said before that there are 2 types of companies out there, the ones who have been breached and those who will be breached. Defending against attackers who want to compromise assets can seem like an arduous task, but learning how attacks work and more importantly how to defend against those attacks can be very fulfilling. This specialization is designed to introduce you to practical computer security by teaching you the fundamentals of how you use security in the business world. This course is for those who want to understand how to defend computer systems and assets from attackers and other threats. It is also for those who want to understand how threats and attacks are carried out to help better defend their systems. This specialization is designed for senior business leaders to middle management and system administrators, so they can all speak the same language and get a better handle on their organization's security. Additionally, the course material may help you in passing some industry leading computer security examinations such as Security+ and CISSP.
Follow the suggested order or choose your own.
Designed to help you practice and apply the skills you learn.
Highlight your new skills on your resume or LinkedIn.
- Beginner Specialization.
- No prior experience required.
Introduction to Cybersecurity for BusinessUpcoming session: Mar 26
About the CourseThe world runs computers. From small to large businesses, from the CEO down to level 1 support staff, everyone uses computers. This course is designed to give you a practical perspective on computer security. This course approaches computer sec
Cyber Threats and Attack VectorsUpcoming session: Mar 26
About the CourseData breaches occur nearly every day. From very large retailers, down to your fantasy football website, and anywhere in between, they have been compromised in some way. How did the attackers get in? What did they do with the data they compromised? Wha
Detecting and Mitigating Cyber Threats and AttacksUpcoming session: Mar 26
About the CourseComputer attacks and data breaches are inevitable. It seems like every day a data breach occurs and the victims of the data breach suffer. Their information is stolen or posted online. The company’s or businesses who had the breach go on, learn
Proactive Computer SecurityUpcoming session: Mar 26
About the CourseI’ve heard this before – “I’m not sure my computer security practices are working”. I reply “Have you tested them?” This course is the fourth and final course in the Practical Computer Security specialization. In this course, you’ll lear
More questions? Visit the Learner Help Center.