Want to learn basics of Cyber Security? Dr. Edward G. Amoroso will teach you basics of Cyber Security. You will learn modern information and system protection technology and methods. You will learn about cryptography, Risk Assessments, Cyber Defense, Cyber Attacks etc. in this course.
Every Specialization includes a hands-on project. After completing the courses you will get Certificate.
Introduction to Cyber Attacks
Course Link: – https://www.coursera.org/learn/intro-cyber-attacks
Instructor Name: – Dr. Edward G. Amoroso
Course Duration: – 4.5 hours
Pricing: – N/A
Ratings: – 4.7 out of 5
What you will learn in this course:-
- Learn common cyber security threats, vulnerabilities, and risks.
- How basic cyber-attacks are constructed and applied to real systems
- Learn simple Unix kernel hackings
- Internet worms and Trojan horses in software utilities
- Learn how distributed denial of service (DDOS) attack works
- Learn how botnet- attacks works
- Familiar analytic models are outlined such as the confidentiality/integrity/availability (CIA) security threat framework
- Learn introduction to basic cyber security risk analysis
Featured reviews of the course: - “Great introduction to cybersecurity concepts with relevant supplemental material in the form of journal papers, magazine articles and supporting TED talks and videos. Highly recommended!” –AA
“I love this instructor. He makes learning a lot more fun , especially when he gives a real world description of the point he's trying to get across. Well done :) Thanks for this course!” - JE
Cyber Attack Countermeasures
Course Link: – https://www.coursera.org/learn/cyber-attack-countermeasures
Instructor Name: – Dr. Edward G. Amoroso
Course Duration: – 5 hours approximately
Pricing: – N/A
Ratings: – 4.8 out of 5
What you will learn in this course:-
- Introduction of the basics of cyber defense starting with foundational models such as Bell-LaPadula and information flow frameworks.
- Introduction of basic functional protections, starting with authentication methods.
- Introduction to a series of different authentication solutions and protocols, including RSA SecureID and Kerberos, in the context of a canonical schema.
- The basics of cryptography are also introduced with attention to conventional block ciphers as well as public key cryptography.
- Important cryptographic techniques such as cipher block chaining and triple-DES are explained.
- Modern certification authority-based cryptographic support is also discussed.
Featured reviews of this course “This is an excellent course with enough historical context for those who are not familiar with cybersecurity and good videos and current developments in the field.”–TK
“I like how Dr. Amoroso made some complicated concept sounds easy. I also love when he told us about the history of cyber security in this course.”–NS
Real-Time Cyber Threat Detection and Mitigation
Course Link: – https://www.coursera.org/learn/real-time-cyber-threat-detection
Instructor Name: – Dr. Edward G. Amoroso
Course Duration: – 4.5 hours approximately
Pricing: – N/A
Ratings: – 4.7 out of 5
What you will learn in this course:-
- Introduction of real-time cyber security techniques and methods in the context of the TCP/IP protocol suites
- Learn explanation of some basic TCP/IP security hacks
- Learn the techniques to design and configure firewall solutions such as packet filters and proxies to protect enterprise assets.
- Learn DDOS attack and Third Party attack
Featured reviews of this course “I used this course a refresh for established cyber skills, its been a welcome change to have such an enthusiastic lecturer and revisit some of the cornerstones of cyber.”–DK
“I enjoyed this course! Instructor one of the best I have seen. The course material is easy to follow as well.”–PF
Enterprise and Infrastructure Security
Course Link: – https://www.coursera.org/learn/real-time-cyber-threat-detection
Instructor Name: – Dr. Edward G. Amoroso
Course Duration: – 4 hours approximately
Pricing: – N/A
Ratings: – 4.7 out of 5
What you will learn in this course :-
- Introduction to NIST and PCI
- Learn Hybrid cloud architectures
- Learn blockchain, blinding algorithms, Internet of Things (IoT), and critical infrastructure protection
- Learn mobile security and cloud security hyper-resilience approaches
- Learn how to plan your careers in cyber security
Featured reviews of this course “Prof. Ed presented wonderful courses in cyber security . He always can explain the complicated thing in a easy way and bring the cut-edge technology to the students . Bravo ! Prof. Ed”–WC
“Very Interesting . Course information was very well laid out & helped understand quickly without much difficulty. My proficiency level is Beginner in Cyber Security” – ZZ