Course Summary
Learn how to design and implement enterprise infrastructure security measures in this course. Covering topics such as network and cloud security, data protection, and compliance, you'll gain the skills necessary to secure enterprise environments.Key Learning Points
- Understand the importance of enterprise infrastructure security
- Learn about network security, cloud security, and data protection
- Develop skills in compliance and risk management
Related Topics for further study
Learning Outcomes
- Design and implement enterprise infrastructure security measures
- Understand the importance of compliance and risk management
- Develop skills in data protection and network and cloud security
Prerequisites or good to have knowledge before taking this course
- Basic knowledge of computer networks
- Familiarity with cloud computing concepts
Course Difficulty Level
IntermediateCourse Format
- Online
- Self-paced
- Video Lectures
- Hands-on Exercises
Similar Courses
- Cybersecurity Essentials
- Network Security
- Cloud Security
Related Education Paths
- Certified Information Systems Security Professional (CISSP)
- CompTIA Security+
- Certified Information Security Manager (CISM)
Notable People in This Field
- Bruce Schneier
- Troy Hunt
- Brian Krebs
Related Books
Description
This course introduces a series of advanced and current topics in cyber security, many of which are especially relevant in modern enterprise and infrastructure settings. The basics of enterprise compliance frameworks are provided with introduction to NIST and PCI. Hybrid cloud architectures are shown to provide an opportunity to fix many of the security weaknesses in modern perimeter local area networks.
Outline
- Security Awareness, Compliance, Assessments, and Risk
- Introduction: What You Will Learn from This Course on Cyber Security
- Assignments and Reading
- Social Engineering
- Phishing
- Security Awareness
- Using Video for Security Awareness
- Security Assessment and Audit
- What is GRC?
- NIST Framework Overview
- PCI-DSS Framework Overview
- Challenges of Compliance versus Security
- Welcome Roger Thornton (Part 1): CTO, AlienVault
- Required: “Framework for Improving Critical Infrastructure Cybersecurity,” Version 1.0, NIST, Feb 12, 2014.
- Video: “Addressing the Challenges of Complying with the Payment Card Industry Data Security Standard,” HALOCK Security Labs – Introduction to PCI Compliance
- Video: “Closing Keynote – The Past, Present, and Future of Integrated GRC,” French Caldwell, MetricStream
- Suggested: Introduction to Cyber Security, Edward Amoroso and Matthew Amoroso, eBook available online (Chapters 25 - 26)
- Module 1 Quiz
- Hybrid Cloud Security
- Assignments and Reading
- Enterprise Shift to Hybrid Cloud
- Workload Micro-Segmentation
- Defense in Depth through Micro-Segmentation
- Cloud Access Security Brokers
- Advanced Hybrid Cloud Security Architecture (Part 1)
- Advanced Hybrid Cloud Security Architecture (Part 2)
- Advanced Hybrid Cloud Security Architecture (Part 3)
- Security of Isolated Servers (Outside Perimeter)
- Welcome John Popolizio: Founder, Riverdale Group
- Required: “Practical Methods for Securing the Cloud,” IEEE, Ed Amoroso, 2014
- Suggested: Introduction to Cyber Security, Edward Amoroso and Matthew Amoroso, eBook available online (Chapters 27 - 28)
- Module 2 Quiz
- Blockchain, Anonymity, and Critical Infrastructure Protection
- Assignments and Reading
- Hashing Algorithms
- Blockchain - Part 1
- Blockchain - Part 2
- Cyber Attribution
- Onion Routing and Tor
- Chaum Binding Algorithm
- Critical Infrastructure - Part 1 - Requirements
- Critical Infrastructure - Part 2 - Protection Methods
- Welcome Roger Thornton (Part 2): CTO, AlienVault
- Required: “Bitcoin: A Peer-to-Peer Electronic Cash System,” S. Nakamoto
- Required: “Common Threats and Vulnerabilities of Critical Infrastructures,” Robles, Choi, Cho, Kim, Park, and Lee, Dongseo University, Korea. International Journal of Control and Automation.
- Video: “HDIAC Critical Infrastructure Protection Webinar,” Benjamin Ruddell, Arizona State University, 2015
- Suggested: Introduction to Cyber Security, Edward Amoroso and Matthew Amoroso, eBook available online (Chapters 29 - 30)
- Module 3 Quiz
- Mobility Security and Deception
- Assignments and Reading
- Mobility Security
- IMSI Catching
- IoT Security
- IoT Botnets
- Using Deception and Honey Pots for Security
- Welcome Elena Kvochko, Cyber Security Expert
- Advice on Careers in Cyber Security
- How to Continue a Learning Plan in Cyber Security
- Required: “Anonymous Connections and Onion Routing,” Michael Reed, Paul Syverson, and David Goldschlag, onion-router.net.
- Required: “Cyber Security Deception,” Mohammed Almeshekah and Eugene Spafford, Springer.com
- Video: “Kevin Mahaffey – Lookout – Mobile Security,”
- Project Description
- Additional Self-Study
- Module 4 Quiz
- Multiple Choice Questions
Summary of User Reviews
The Enterprise Infrastructure Security course on Coursera received positive reviews from users. The course covers a wide range of topics related to enterprise infrastructure security and is taught by knowledgeable instructors. Many users appreciated the hands-on experience provided by the course.Key Aspect Users Liked About This Course
Hands-on experience provided by the coursePros from User Reviews
- Instructors are knowledgeable and provide useful insights
- Covers a wide range of topics related to enterprise infrastructure security
- Provides hands-on experience which is helpful for practical applications
- Course content is well-structured and easy to follow
- Provides a good overview of security concepts and best practices
Cons from User Reviews
- Some users found the course material to be too basic
- Course may be too technical for beginners
- Some users experienced technical issues with the platform
- Some users felt that the course could be more engaging
- Course may not be suitable for those with advanced knowledge in the field