Enterprise and Infrastructure Security

  • 4.7
Approx. 15 hours to complete

Course Summary

Learn how to design and implement enterprise infrastructure security measures in this course. Covering topics such as network and cloud security, data protection, and compliance, you'll gain the skills necessary to secure enterprise environments.

Key Learning Points

  • Understand the importance of enterprise infrastructure security
  • Learn about network security, cloud security, and data protection
  • Develop skills in compliance and risk management

Related Topics for further study


Learning Outcomes

  • Design and implement enterprise infrastructure security measures
  • Understand the importance of compliance and risk management
  • Develop skills in data protection and network and cloud security

Prerequisites or good to have knowledge before taking this course

  • Basic knowledge of computer networks
  • Familiarity with cloud computing concepts

Course Difficulty Level

Intermediate

Course Format

  • Online
  • Self-paced
  • Video Lectures
  • Hands-on Exercises

Similar Courses

  • Cybersecurity Essentials
  • Network Security
  • Cloud Security

Related Education Paths


Notable People in This Field

  • Bruce Schneier
  • Troy Hunt
  • Brian Krebs

Related Books

Description

This course introduces a series of advanced and current topics in cyber security, many of which are especially relevant in modern enterprise and infrastructure settings. The basics of enterprise compliance frameworks are provided with introduction to NIST and PCI. Hybrid cloud architectures are shown to provide an opportunity to fix many of the security weaknesses in modern perimeter local area networks.

Outline

  • Security Awareness, Compliance, Assessments, and Risk
  • Introduction: What You Will Learn from This Course on Cyber Security
  • Assignments and Reading
  • Social Engineering
  • Phishing
  • Security Awareness
  • Using Video for Security Awareness
  • Security Assessment and Audit
  • What is GRC?
  • NIST Framework Overview
  • PCI-DSS Framework Overview
  • Challenges of Compliance versus Security
  • Welcome Roger Thornton (Part 1): CTO, AlienVault
  • Required: “Framework for Improving Critical Infrastructure Cybersecurity,” Version 1.0, NIST, Feb 12, 2014.
  • Video: “Addressing the Challenges of Complying with the Payment Card Industry Data Security Standard,” HALOCK Security Labs – Introduction to PCI Compliance
  • Video: “Closing Keynote – The Past, Present, and Future of Integrated GRC,” French Caldwell, MetricStream
  • Suggested: Introduction to Cyber Security, Edward Amoroso and Matthew Amoroso, eBook available online (Chapters 25 - 26)
  • Module 1 Quiz
  • Hybrid Cloud Security
  • Assignments and Reading
  • Enterprise Shift to Hybrid Cloud
  • Workload Micro-Segmentation
  • Defense in Depth through Micro-Segmentation
  • Cloud Access Security Brokers
  • Advanced Hybrid Cloud Security Architecture (Part 1)
  • Advanced Hybrid Cloud Security Architecture (Part 2)
  • Advanced Hybrid Cloud Security Architecture (Part 3)
  • Security of Isolated Servers (Outside Perimeter)
  • Welcome John Popolizio: Founder, Riverdale Group
  • Required: “Practical Methods for Securing the Cloud,” IEEE, Ed Amoroso, 2014
  • Suggested: Introduction to Cyber Security, Edward Amoroso and Matthew Amoroso, eBook available online (Chapters 27 - 28)
  • Module 2 Quiz
  • Blockchain, Anonymity, and Critical Infrastructure Protection
  • Assignments and Reading
  • Hashing Algorithms
  • Blockchain - Part 1
  • Blockchain - Part 2
  • Cyber Attribution
  • Onion Routing and Tor
  • Chaum Binding Algorithm
  • Critical Infrastructure - Part 1 - Requirements
  • Critical Infrastructure - Part 2 - Protection Methods
  • Welcome Roger Thornton (Part 2): CTO, AlienVault
  • Required: “Bitcoin: A Peer-to-Peer Electronic Cash System,” S. Nakamoto
  • Required: “Common Threats and Vulnerabilities of Critical Infrastructures,” Robles, Choi, Cho, Kim, Park, and Lee, Dongseo University, Korea. International Journal of Control and Automation.
  • Video: “HDIAC Critical Infrastructure Protection Webinar,” Benjamin Ruddell, Arizona State University, 2015
  • Suggested: Introduction to Cyber Security, Edward Amoroso and Matthew Amoroso, eBook available online (Chapters 29 - 30)
  • Module 3 Quiz
  • Mobility Security and Deception
  • Assignments and Reading
  • Mobility Security
  • IMSI Catching
  • IoT Security
  • IoT Botnets
  • Using Deception and Honey Pots for Security
  • Welcome Elena Kvochko, Cyber Security Expert
  • Advice on Careers in Cyber Security
  • How to Continue a Learning Plan in Cyber Security
  • Required: “Anonymous Connections and Onion Routing,” Michael Reed, Paul Syverson, and David Goldschlag, onion-router.net.
  • Required: “Cyber Security Deception,” Mohammed Almeshekah and Eugene Spafford, Springer.com
  • Video: “Kevin Mahaffey – Lookout – Mobile Security,”
  • Project Description
  • Additional Self-Study
  • Module 4 Quiz
  • Multiple Choice Questions

Summary of User Reviews

The Enterprise Infrastructure Security course on Coursera received positive reviews from users. The course covers a wide range of topics related to enterprise infrastructure security and is taught by knowledgeable instructors. Many users appreciated the hands-on experience provided by the course.

Key Aspect Users Liked About This Course

Hands-on experience provided by the course

Pros from User Reviews

  • Instructors are knowledgeable and provide useful insights
  • Covers a wide range of topics related to enterprise infrastructure security
  • Provides hands-on experience which is helpful for practical applications
  • Course content is well-structured and easy to follow
  • Provides a good overview of security concepts and best practices

Cons from User Reviews

  • Some users found the course material to be too basic
  • Course may be too technical for beginners
  • Some users experienced technical issues with the platform
  • Some users felt that the course could be more engaging
  • Course may not be suitable for those with advanced knowledge in the field
English
Available now
Approx. 15 hours to complete
Dr. Edward G. Amoroso
New York University
Coursera

Instructor

Dr. Edward G. Amoroso

  • 4.7 Raiting
Share
Saved Course list
Cancel
Get Course Update
Computer Courses