Real-Time Cyber Threat Detection and Mitigation

  • 4.7
Approx. 15 hours to complete

Course Summary

Learn how to detect and respond to cyber threats in real-time with this course. Explore tools and techniques that are used in the industry to detect cyber threats and prevent them from causing damage.

Key Learning Points

  • Understand the tools and techniques used to detect cyber threats in real-time
  • Learn how to respond and prevent cyber attacks
  • Get hands-on experience with real-world examples

Job Positions & Salaries of people who have taken this course might have

    • USA: $75,000 - $130,000
    • India: INR 5,00,000 - INR 10,00,000
    • Spain: €30,000 - €60,000
    • USA: $75,000 - $130,000
    • India: INR 5,00,000 - INR 10,00,000
    • Spain: €30,000 - €60,000

    • USA: $60,000 - $120,000
    • India: INR 4,00,000 - INR 8,00,000
    • Spain: €25,000 - €50,000
    • USA: $75,000 - $130,000
    • India: INR 5,00,000 - INR 10,00,000
    • Spain: €30,000 - €60,000

    • USA: $60,000 - $120,000
    • India: INR 4,00,000 - INR 8,00,000
    • Spain: €25,000 - €50,000

    • USA: $80,000 - $140,000
    • India: INR 6,00,000 - INR 12,00,000
    • Spain: €35,000 - €70,000

Related Topics for further study


Learning Outcomes

  • Develop the skills to detect and respond to cyber threats in real-time
  • Learn how to prevent cyber attacks from causing damage
  • Understand the tools and techniques used in the industry to detect cyber threats

Prerequisites or good to have knowledge before taking this course

  • Basic knowledge of cybersecurity concepts
  • Familiarity with programming languages such as Python and Java

Course Difficulty Level

Intermediate

Course Format

  • Online
  • Self-paced

Similar Courses

  • Cybersecurity Fundamentals
  • Cybersecurity and Privacy in the IoT

Related Education Paths


Notable People in This Field

  • Security Technologist, Author and Cryptographer
  • Chief Research Officer, F-Secure

Related Books

Description

This course introduces real-time cyber security techniques and methods in the context of the TCP/IP protocol suites. Explanation of some basic TCP/IP security hacks is used to introduce the need for network security solutions such as stateless and stateful firewalls. Learners will be introduced to the techniques used to design and configure firewall solutions such as packet filters and proxies to protect enterprise assets.

Outline

  • Basic Network Security
  • Introduction: What You Will Learn from This Course on Cyber Security
  • Assignments and Reading
  • Security Through Obscurity
  • TCP/IP Evolution and Security
  • TCP/IP Overview
  • IP Spoofing
  • TCP Sequence Number Attack
  • Packet Flooding
  • Packet Sniffing
  • SYN Packets for Access Control
  • Definition of a Firewall
  • Firewall: Stateful versus Stateless
  • Interview: John Viega
  • Required: “Network Firewalls,” Steve Bellovin and Bill Cheswick
  • Required: “Introduction to TCP/IP Network Attacks,” Guang Yang
  • Video: “Hacking DNS,” Eli the Computer Guy
  • Suggested: Introduction to Cyber Security, Edward Amoroso and Matthew Amoroso, (Ch. 17 - 18)
  • Suggested: TCP/IP Illustrated Volume 1 (2nd Edition), Kevin Fall and W. Richard Stevens, (Ch. 17 – 18)
  • Module 1 Quiz
  • More Advanced Network Security Technologies
  • Assignments and Reading
  • Packet Filtering
  • Sample Packet Filtering and Reference Architecture
  • Default Firewall Block
  • Firewall Rules to Allow Outbound Web Browsing
  • Firewall Rules to Allow Telnet and Other TCP Services
  • Establishing Corporate Policy Rules
  • FTP Protocol
  • Firewall Rules for FTP
  • Application Proxy Filtering
  • Forward and Reverse Proxies
  • Interview: Roger Piqueras Jover
  • Required: “Anomaly-based Network Intrusion Detection: Techniques, Systems, and Challenges.”
  • Required: “Intrusion Detection via Static Analysis,” Wagner and Dean
  • Video: “How Does Intrusion Prevention Systems Work,” 2013 - SourceFire
  • Suggested: Introduction to Cyber Security, Edward Amoroso and Matthew Amoroso, (Chapters 19 - 20)
  • Module 2 Quiz
  • Network Security Architectures
  • Assignments and Readings
  • Firewall Architectures (Part 1)
  • Firewall Architectures (Part 2)
  • Management by Exception
  • System Auditing
  • Basics of Intrusion Detection
  • Signature Versus Behavioral Detection
  • IDS Versus IPS
  • Design of SIEM
  • Design of a SOC
  • Interview: Dino Dai Zovi
  • Required: “An Evening with Berferd,” Bill Cheswick
  • Required: “IDES Model,” Dorothy Denning
  • Video: “DEFCAMP 2015 – Building a Security Operations Center,”
  • Suggested: Introduction to Cyber Security, Edward Amoroso and Matthew Amoroso, (Ch. 21 - 22)
  • Module 3 Quiz
  • Enterprise Network Security
  • Assignments and Reading
  • Practical Limitations of Perimeter
  • APT Schema Through Perimeter Holes
  • Third Party Security
  • Target APT Attack
  • Large Government Agency Attack
  • Layer 3 DDOS Protection
  • Layer 7 Application Level DDOS Risk
  • Large Financial Website DDOS Attacks
  • Network Security Industry Overview
  • Interview: Ray Cheng - Pt. 1
  • Interview: Ray Cheng - Pt. 2
  • Required: “From the Enterprise Perimeter to Mobility Enabled Cloud,” Ed Amoroso, IEEE
  • Required: “A Study of Advanced Persistent Threats,” Chen, Desmet, and Huygens
  • “Implementing Zero Trust,” Ed Amoroso, 2018
  • Suggested: Introduction to Cyber Security, Edward Amoroso and Matthew Amoroso, (Ch. 23 - 24)
  • Quiz Directions
  • Module 4 Quiz
  • Select the Best Migration Choice:

Summary of User Reviews

Real-time Cyber Threat Detection course is highly recommended by many users who found the content to be informative and practical. The course has received positive reviews overall.

Key Aspect Users Liked About This Course

The practical approach to learning about cyber threat detection was highly appreciated by many users.

Pros from User Reviews

  • The course content is up-to-date and relevant to current cyber security threats.
  • The instructors are knowledgeable and provide clear explanations.
  • The course is well-structured and easy to follow.
  • The hands-on exercises and labs are very helpful in reinforcing the concepts.
  • The course provides a good foundation for anyone interested in pursuing a career in cyber security.

Cons from User Reviews

  • The course may be too basic for more experienced cyber security professionals.
  • Some users found the pace of the course to be too slow.
  • The course could benefit from more advanced topics and techniques.
  • The course does not cover some specific tools or technologies used in cyber security.
  • Some users found the course to be too theoretical and lacking in practical examples.
English
Available now
Approx. 15 hours to complete
Dr. Edward G. Amoroso
New York University
Coursera

Instructor

Dr. Edward G. Amoroso

  • 4.7 Raiting
Share
Saved Course list
Cancel
Get Course Update
Computer Courses