Cybersecurity Fundamentals MicroBachelors

What you will learn:
Apply a security mindset while remaining ethical.
Implement security design principles.
Explain the core concepts of access control.
Implement reference monitors.
Apply security policies that are commonly used in modern operating systems.
Analyze the security of a basic secure system.
Explain virtualization and the impact on security and efficiency.
8. Think and work like an ethical penetration tester, implementing a repeatable and mature methodology that is tailored for each assessment.
With a given target, successfully identify vulnerabilities, score their risk, and explain mitigations.
Responsibly disclose findings in a professional report that can be used to recreate the exploit, explain the impact to the target, and prioritize each finding.
Enumerate target hosts, domains, exposures, and attack surface.
Identify flaws and vulnerabilities in applications, websites, networks, systems, protocols, and configurations using both manual techniques and assistive tools.
Reverse engineer compiled applications to discover exploitable weaknesses.
Write new exploits to test various types of vulnerabilities on clients, against servers, and to escalate privileges.
Demonstrate the fundamentals of secure network design.
Understand the issues involved with providing secure networks.
Analyze underlying cryptography required for secure communications, authorization and authorization.
Enumerate the issues involved with providing secure networks.

Sort options

Penetration Testing - Post Exploitation (edX)

Learn post-exploitation phases of penetration testing, including Owning, Pivoting, Privilege Escalation and other advanced penetration testing topics. The machine's value is determined by the sensitivity of the data stored on it and the machine's usefulness in further compromising the network.
0
No votes yet

Penetration Testing - Exploitation (edX)

Learn exploitation phase of penetration testing, including the foundations of explorations, application debugging, reverse engineering, exploitation development and web application exploitation. This is a self-paced course that continues the development of ethical hacking skills. The curriculum provides an introduction to the exploitation phase of penetration testing topics. Among the [...]
0
No votes yet

Penetration Testing - Discovering Vulnerabilities (edX)

Learn fundamentals of penetration testing, including an Introduction to Penetration Testing Methodologies, Recognisance and Enumeration for Penetration Testers, Scanning and Vulnerability Enumeration. The class starts with an overview of penetration testing and the phases of a penetration test. The 1st phase is Scoping. In the scoping stage, the students [...]
0
No votes yet

Network Security - Advanced Topics (edX)

Learn advanced topics in network security, including Security Monitoring, Perimeter Security, IPv6 and IPv6 Security. The material is essential in later classes that will develop ethical hacking skills. Students are introduced to the concept of network security monitoring to detect intrusions instead of merely protecting against [...]
0
No votes yet

Network Security - Protocols (edX)

Learn more fundamentals of network security, including cryptographic algorithms used in networking protocols, TLS/SSL, IPSec Layer 2 Security and Wireless Security. Students are provided with a broad understanding of cryptography, from its classical applications dating from the Roman empire to modern cryptography, including the public key cryptography and hashing [...]
0
No votes yet

Network Security - Introduction to Network Security (edX)

Learn fundamentals of network security, including a deep dive into how networks are attacked by malicious users. This is a self-paced course that provides an introduction to network security topics. The curriculum focusses on how malicious users attack networks. The material is essential in later classes that will develop [...]
0
No votes yet

Information Security - Introduction to Information Security (edX)

Learn the fundamentals of information security, including Security Design Principles, Threat Modeling and Security Policy. This is a self-paced course that provides an introduction to information security and cybersecurity. Students gain a broad overview of Information Security and Privacy (ISP) through high-level ISP concepts. We discuss both traditional design [...]
0
No votes yet

Information Security - Advanced topics (edX)

Learn more fundamentals of information security, including Injection Attacks and Defenses, Privacy and Anonymity Software Validity and Rights, Cryptocurrency. This is the 3rd course in the intermediate, undergraduate-level offering that makes up the larger Cybersecurity Fundamentals MicroBachelors Program. [...]
0
No votes yet

Information Security - Authentication and Access Control (edX)

Learn more fundamentals of information security, including Introduction to Cryptography, Authentication, Access Control and Containerization. This is the 2nd course in the intermediate, undergraduate-level offering that makes up the larger Cybersecurity Fundamentals MicroBachelors Program.
0
No votes yet