Starweaver
Mastering Endpoint Security & Threat Defense
Starweaver

Mastering Endpoint Security & Threat Defense

Starweaver
Rohit Mukherjee

位教师:Starweaver

包含在 Coursera Plus

深入了解一个主题并学习基础知识。
中级 等级

推荐体验

9 小时 完成
灵活的计划
自行安排学习进度
深入了解一个主题并学习基础知识。
中级 等级

推荐体验

9 小时 完成
灵活的计划
自行安排学习进度

您将学到什么

  • Apply endpoint security principles to evaluate architectural components, identify common attack vectors, and implement baseline hardening techniques.

  • Configure endpoint telemetry tools to collect and interpret suspicious system activity.

  • Configure native Windows security controls to enforce Zero Trust at the endpoint level.

  • Analyze endpoint behavior to detect and respond to potential insider threats.

要了解的详细信息

可分享的证书

添加到您的领英档案

最近已更新!

September 2025

授课语言:英语(English)

了解顶级公司的员工如何掌握热门技能

Petrobras, TATA, Danone, Capgemini, P&G 和 L'Oreal 的徽标

该课程共有6个模块

In this course, you’ll learn how to build and manage endpoint security as the first line of defense in today’s threat landscape. You’ll focus on designing secure endpoint architectures, applying Zero Trust principles, and using tools like Sysmon, Sigma, and Velociraptor to detect and investigate threats. Through expert-led instruction, real-world scenarios, and hands-on labs in virtual environments, you’ll gain the skills to monitor processes, analyze alerts, and respond to insider and external threats. By the end, you’ll be equipped to think like a SOC analyst, correlate logs and behaviors, and implement practical defenses that protect endpoints and strengthen overall cybersecurity posture.

涵盖的内容

1个视频1篇阅读材料1个插件

In this module, you’ll learn why endpoints are a critical focus in cybersecurity and how attackers often exploit them to reach organizational data. You’ll explore endpoint types, common attack vectors, the CIA triad, and baseline hardening principles, and analyze real-world attack scenarios to see these concepts in action. You’ll also work with CIS-CAT Lite in hands-on labs to assess configurations and understand how architectural components like agents and policy engines interact. Finally, you’ll apply foundational security practices to strengthen baseline defenses and build a resilient endpoint environment.

涵盖的内容

10个视频1篇阅读材料1个作业1次同伴评审2个讨论话题

In this module, you’ll learn how Endpoint Detection and Response (EDR) strengthens modern security beyond traditional antivirus solutions. You’ll explore how EDR collects and analyzes telemetry, apply frameworks like MITRE ATT&CK to shape detection strategies, and practice using tools such as Sysmon, Process Monitor, osquery, and Velociraptor for visibility and threat hunting. Through hands-on configuration and guided workflows, you’ll build skills in interpreting endpoint telemetry, investigating suspicious activity, and applying structured analysis techniques to real-world defense scenarios.

涵盖的内容

10个视频1篇阅读材料1个作业1次同伴评审2个讨论话题

In this module, you’ll learn why Zero Trust is essential in today’s borderless networks and how it transforms access control beyond traditional perimeter defenses. You’ll explore core principles such as continuous verification, least privilege, and microsegmentation across identity, device, and application layers. Through real-world reference architectures and policy enforcement models, you’ll gain practical insight into Zero Trust design. Finally, you’ll apply these concepts in a hands-on lab using OpenZiti and endpoint hardening to rethink access workflows and experiment with identity-based segmentation.

涵盖的内容

10个视频1篇阅读材料1个作业1次同伴评审2个讨论话题

In this module, you’ll learn how to identify and mitigate insider threats—one of the most challenging risks in cybersecurity. You’ll explore insider motives, behavioral indicators, and monitoring techniques based on log analysis and baseline deviations, while also considering the legal and ethical implications of monitoring trusted users. Through case studies, detection strategies, and hands-on simulations with Sysmon and Sigma, you’ll practice analyzing behavior patterns, interpreting activity trails, and evaluating potential misuse of privileges to build a responsible and effective insider threat program.

涵盖的内容

10个视频1篇阅读材料1个作业1次同伴评审2个讨论话题

In this wrap-up module, you’ll consolidate everything learned across the course by demonstrating your ability to secure, monitor, and investigate a real-world endpoint scenario. Through a graded assessment, hands-on project, and final reflections, you’ll apply endpoint hardening techniques, configure telemetry, simulate insider or malware-like activity, and conduct a structured investigation using free tools. By the end, you’ll showcase the practical skills of a SOC analyst—detecting, responding, and reporting on endpoint threats—while reinforcing your readiness for professional roles and certifications in cybersecurity defense.

涵盖的内容

1个视频1次同伴评审

位教师

Starweaver
Starweaver
446 门课程818,636 名学生
Rohit Mukherjee
Starweaver
1 门课程37 名学生

提供方

Starweaver

从 Security 浏览更多内容

人们为什么选择 Coursera 来帮助自己实现职业发展

Felipe M.
自 2018开始学习的学生
''能够按照自己的速度和节奏学习课程是一次很棒的经历。只要符合自己的时间表和心情,我就可以学习。'
Jennifer J.
自 2020开始学习的学生
''我直接将从课程中学到的概念和技能应用到一个令人兴奋的新工作项目中。'
Larry W.
自 2021开始学习的学生
''如果我的大学不提供我需要的主题课程,Coursera 便是最好的去处之一。'
Chaitanya A.
''学习不仅仅是在工作中做的更好:它远不止于此。Coursera 让我无限制地学习。'
Coursera Plus

通过 Coursera Plus 开启新生涯

无限制访问 10,000+ 世界一流的课程、实践项目和就业就绪证书课程 - 所有这些都包含在您的订阅中

通过在线学位推动您的职业生涯

获取世界一流大学的学位 - 100% 在线

加入超过 3400 家选择 Coursera for Business 的全球公司

提升员工的技能,使其在数字经济中脱颖而出

常见问题

¹ 本课程的部分作业采用 AI 评分。对于这些作业,将根据 Coursera 隐私声明使用您的数据。