Logo

$79

Proactive Computer Security

Created by -

Greg Williams
,
University of Colorado System

0.00

(0 ratings)

English

Wishlist

Overview

I've heard this before - "I'm not sure my computer security practices are working". I reply "Have you tested them?" This course is the fourth and final course in the Practical Computer Security specialization. In this course, you'll learn how to proactively test what you have put in place to protect your data. In the first week you'll be able to discuss the basics of deterrents and how to "trick" attackers into believing they've hit a goldmine of data away from your real systems. In week 2, you'll be able to understand and discuss the steps of penetration testing methodology. In week 3, you will be able to understand and apply what you have learned on your own systems to test whether your systems are secure or not. In week 4, we'll discuss planning for your own methodology that you can apply to your own systems. And finally in week 5, we'll finish up with a project that will allow you to test your skills in a safe environment.

course image

USD 79

provider image

Type: Online

This course includes

  • Earn a Certificate upon completion
  • Start instantly and learn at your own schedule.

Taken this course?

Share your experience with other students

Share

Add Review

course image

USD 79

provider image

Type: Online

This course includes

  • Earn a Certificate upon completion
  • Start instantly and learn at your own schedule.

Taken this course?

Share your experience with other students

Share

Add Review

Proactive Computer Security

Created by -

Greg Williams
,
University of Colorado System

0.00

(0 ratings)

All Levels

Start Date: February 23rd 2021

Course Description

I've heard this before - "I'm not sure my computer security practices are working". I reply "Have you tested them?" This course is the fourth and final course in the Practical Computer Security specialization. In this course, you'll learn how to proactively test what you have put in place to protect your data. In the first week you'll be able to discuss the basics of deterrents and how to "trick" attackers into believing they've hit a goldmine of data away from your real systems. In week 2, you'll be able to understand and discuss the steps of penetration testing methodology. In week 3, you will be able to understand and apply what you have learned on your own systems to test whether your systems are secure or not. In week 4, we'll discuss planning for your own methodology that you can apply to your own systems. And finally in week 5, we'll finish up with a project that will allow you to test your skills in a safe environment.

The information used on this page is how each course is described on the Coursera platform.

Course Structure

Tags

Mark Complete


About the Instructor

Greg Williams,University of Colorado System

No Reviews at this moment.

Explore Skillqore

Skillqore Newsletter

Keep me up to date with content, updates, and offers from Skillqore


Copyright © 2020 Skillqore, Inc. All Rights Reserved.