Introduction to Cyber Security Specialization

Cyber Security. An introduction to modern information and system protection technology and methods.

Instructor: Dr. Edward G. Amoroso

What you'll learn

  •   Summarize the main purpose of cyber security as a discipline
  •   Summarize the basics of identification and authentication in cyber security
  •   Explain the pros and cons of security through obscurity
  •   Develop a lifelong learning plan for potential careers in cyber security
  • Skills you'll gain

  •   Cyber Attacks
  •   Distributed Denial-Of-Service (DDoS) Attacks
  •   Firewall
  •   Threat Modeling
  •   Mobile Security
  •   Authentications
  •   Data Encryption Standard
  •   Cyber Security Policies
  •   Cybersecurity
  •   Infrastructure Security
  •   Computer Security
  •   Enterprise Security
  • Specialization - 4 course series

    Quizzes and projects for Introduction to Cyber Security were designed to exercise the learner’s understanding and retention of the covered topics. Emphasis is on foundational issues, rather than just memorizing facts. The goal is to help learners develop the habit of properly assessing and improving cyber risk posture in real computing, networking, and software systems. Authentic scenarios are included based on practical enterprise and infrastructure deployments to enhance the learning experience.

    Familiar analytic models are outlined such as the confidentiality/integrity/availability (CIA) security threat framework, and examples are used to illustrate how these different types of threats can degrade real assets. The course also includes an introduction to basic cyber security risk analysis, with an overview of how threat-asset matrices can be used to prioritize risk decisions. Threats, vulnerabilities, and attacks are examined and mapped in the context of system security engineering methodologies.

    The basics of cryptography are also introduced with attention to conventional block ciphers as well as public key cryptography. Important cryptographic techniques such as cipher block chaining and triple-DES are explained. Modern certification authority-based cryptographic support is also discussed and shown to provide basis for secure e-commerce using Secure Sockets Layer (SSL) schemes.

    Perimeter solutions such as firewalls and intrusion prevention systems are shown to have significant drawbacks in common enterprise environments. The result of such weakness is shown to often exist as advanced persistent threats (APTs) from nation-state actors. Such attacks, as well as DDOS and third-party attacks, are shown to have potential solutions for modern enterprise.

    Emerging security issues in blockchain, blinding algorithms, Internet of Things (IoT), and critical infrastructure protection are also described for learners in the context of cyber risk. Mobile security and cloud security hyper-resilience approaches are also introduced. The course completes with some practical advice for learners on how to plan careers in cyber security.

    Cyber Attack Countermeasures

    Real-Time Cyber Threat Detection and Mitigation

    Enterprise and Infrastructure Security

    ©2025  ementorhub.com. All rights reserved