Infosec
CompTIA Security+ 701
Infosec

CompTIA Security+ 701

26,428 人已注册

深入了解一个主题并学习基础知识。
4.5

(431 条评论)

中级 等级

推荐体验

2 周 完成
在 10 小时 一周
灵活的计划
自行安排学习进度
深入了解一个主题并学习基础知识。
4.5

(431 条评论)

中级 等级

推荐体验

2 周 完成
在 10 小时 一周
灵活的计划
自行安排学习进度

您将学到什么

  • Computer security, including cybersecurity threats, vulnerabilities, and assessments, incident response, and hybrid and cloud environments.

要了解的详细信息

作业

14 项作业

授课语言:英语(English)

了解顶级公司的员工如何掌握热门技能

Petrobras, TATA, Danone, Capgemini, P&G 和 L'Oreal 的徽标

该课程共有14个模块

In this module, we explain general concepts and vocabulary used in cybersecurity and explore categories and types of security controls used to protect assets. Physical controls are also considered as ways of protecting physical infrastructure.

涵盖的内容

5个视频1个作业

In this course, we will discuss protecting sensitive data with cryptography, which is the practice of disguising information in a way that looks random. We will cover the history of cryptography, hashing, passwords, and keys.

涵盖的内容

9个视频1个作业

There are a range of groups and individuals who might carry out an attack or impact an organization's operations. In this course, we review various types of threat actors who might seek to harm an organization along with their motivations. Also discussed are the various ways an attack might occur. Ways a social engineering attack might be carried out is also described.

涵盖的内容

3个视频1个作业

A number of cyberattacks are possible including physical, network, application, and cryptographic attacks. In this course, we review the general types of cyber attacks mentioned in the CompTIA Security+ exam. We also describe their general operation of specific examples of attacks both over the network and in applications.

涵盖的内容

10个视频1个作业

Identity and access management is all about verifying the right users have the right access to the tools and technologies needed to do their job. Learn about the most important security concepts related to identity and access management: identification, authentication, authorization, and accounting.

涵盖的内容

5个视频1个作业

There are a number of ways an organization can create a secure operating environment. In this course, we review ways organizations protect their networks and software in order to prevent data loss.

涵盖的内容

2个视频1个作业

A number of network devices can be used to help secure an organization's networks. In this course, we delve into different network devices used to safeguard networks from malicious activity, protect data confidentiality, and reduce potential harmful intrusions.

涵盖的内容

7个视频1个作业

As an organization implements new technologies and evolves its existing infrastructure, various secure operating requirements should be utilized. In this course, we review the concepts driving security management at an organization including practices, policies, and specific technologies such as a security information and event management system to better monitor a network for security incidents.

涵盖的内容

6个视频1个作业

Virtualization has given rise to a host of new computing technologies and operations. Most major enterprise solutions utilize virtualization, automation, and cloud services. In this course, we review the terminology used in virtualization and how organizations leverage cloud computing services to meet their needs.

涵盖的内容

3个视频1个作业

As mobile devices proliferate the modern workplace, various security controls must be implemented to safeguard the organization from data loss. In this course, we explore mobile device management solutions as well as the manner in which organization choose to implement mobile device usage for their employees.

涵盖的内容

2个视频1个作业

Determining if a system or network is impacted by vulnerabilities is the first step toward identifying and correcting security shortcomings. In this section, we outline the methods by which secure organizations identify vulnerabilities, analyze the findings, and determine which vulnerabilties require a response.

涵盖的内容

6个视频1个作业

This course explains the purpose and main components of an incident response plan and walks through the phases of incident response, contingency planning and creating backups. Explore how an incident response plan works and the basic concepts related to digital forensics.

涵盖的内容

6个视频1个作业

Organizations must be on guard to protect their data both from outside threats as well as inside threats. In this course, we disuss the ideas surrounding data protection through the use of secure data management practices, data management technologies, and regulatory requirements involving how an organization's data protection operation is structured.

涵盖的内容

4个视频1个作业

Secure, mature organizations thoughtfully consider how individuals at the organization will operate and take proactive steps to safeguard the organization from data loss. In this course, we review legal and industry regulations that might shape how an organization operates and we describe the methods by which an organization creates and implements policies.

涵盖的内容

8个视频1个作业

位教师

授课教师评分
4.7 (176个评价)
InfoSec Institute Instructor
Infosec
12 门课程32,874 名学生

提供方

Infosec

从 Security 浏览更多内容

人们为什么选择 Coursera 来帮助自己实现职业发展

Felipe M.
自 2018开始学习的学生
''能够按照自己的速度和节奏学习课程是一次很棒的经历。只要符合自己的时间表和心情,我就可以学习。'
Jennifer J.
自 2020开始学习的学生
''我直接将从课程中学到的概念和技能应用到一个令人兴奋的新工作项目中。'
Larry W.
自 2021开始学习的学生
''如果我的大学不提供我需要的主题课程,Coursera 便是最好的去处之一。'
Chaitanya A.
''学习不仅仅是在工作中做的更好:它远不止于此。Coursera 让我无限制地学习。'

学生评论

4.5

431 条评论

  • 5 stars

    70.18%

  • 4 stars

    20.18%

  • 3 stars

    4.58%

  • 2 stars

    2.75%

  • 1 star

    2.29%

显示 3/431 个

EJ
5

已于 Jul 6, 2025审阅

MK
4

已于 Jan 27, 2025审阅

AM
5

已于 Oct 8, 2025审阅

Coursera Plus

通过 Coursera Plus 开启新生涯

无限制访问 10,000+ 世界一流的课程、实践项目和就业就绪证书课程 - 所有这些都包含在您的订阅中

通过在线学位推动您的职业生涯

获取世界一流大学的学位 - 100% 在线

加入超过 3400 家选择 Coursera for Business 的全球公司

提升员工的技能,使其在数字经济中脱颖而出

常见问题