This course is best suited for individuals who wish to develop expertise in cybersecurity fundamentals, including aspiring security professionals, IT administrators seeking to enhance their security knowledge, developers interested in secure systems design, and business professionals who need to understand cybersecurity risks and controls. Whether you're transitioning into cybersecurity or strengthening your existing technical foundation, this course provides essential knowledge for protecting digital assets and information systems.
通过 Coursera Plus 提高技能,仅需 239 美元/年(原价 399 美元)。立即节省

您将获得的技能
- Cybersecurity
- Cyber Attacks
- Cyber Security Policies
- Personally Identifiable Information
- Security Strategy
- Encryption
- Security Controls
- Information Systems Security
- Network Security
- Zero Trust Network Access
- Cryptography
- Data Security
- Threat Modeling
- Data Storage
- Governance Risk Management and Compliance
- Network Protocols
要了解的详细信息

添加到您的领英档案
December 2025
7 项作业
了解顶级公司的员工如何掌握热门技能

该课程共有7个模块
This module introduces fundamental cybersecurity concepts essential for understanding modern security challenges and organizational risk management. You will explore the CIA Triad (Confidentiality, Integrity, and Availability) as the foundational framework for cybersecurity strategy while examining common cyber threats that organizations face today, including phishing, ransomware, and supply chain attacks. The module covers the evolving cybersecurity landscape driven by cloud computing, remote work, and AI technologies, analyzing real-world data breaches and their impacts on businesses and society. Additionally, we’ll touch on Governance, Risk, and Compliance (GRC) frameworks that align security practices with business objectives and regulatory requirements, establishing the strategic foundation for effective cybersecurity management.
涵盖的内容
3个视频9篇阅读材料1个作业
3个视频• 总计7分钟
- Course Overview • 3分钟
- Meet Your Faculty• 1分钟
- CIA Triad Backbone• 3分钟
9篇阅读材料• 总计43分钟
- Course Introduction• 2分钟
- Syllabus - Systems and Cybersecurity Fundamentals Part 1• 10分钟
- Academic Integrity• 1分钟
- CIA Triad - The Backbone of Cybersecurity• 5分钟
- Cybersecurity Risks in Today’s Landscape• 5分钟
- Common Types of Cyberattacks• 5分钟
- Cybercrimes and Data Breaches• 5分钟
- Governance, Risk and Compliance (GRC)• 5分钟
- Additional Optional Resources• 5分钟
1个作业• 总计30分钟
- Module 1 Quiz• 30分钟
In this module, you'll discover why security policies are the invisible backbone of cybersecurity—often overlooked until a breach exposes their weaknesses. You'll learn to evaluate real-world policies for clarity, enforceability, and coverage of modern risks like cloud services, AI use, and remote work. Through examining actual breach cases, you'll understand how policy gaps directly enable attackers and lead to regulatory fines, lawsuits, and business disruption. By the end of this module, you'll be able to draft security policies that align with legal requirements like GDPR, HIPAA, and PCI-DSS, and write enforceable language that can actually prevent incidents rather than just satisfy auditors. You'll also understand how governance structures ensure policies translate from boardroom principles into daily operational practices that protect your organization.
涵盖的内容
1个视频6篇阅读材料1个作业
1个视频• 总计3分钟
- Why Security Policies and Regulations Matter• 3分钟
6篇阅读材料• 总计34分钟
- Understanding the Role of Policies and Legal Frameworks in Cybersecurity• 2分钟
- Why Security Policies Fail and How to Fix Them• 3分钟
- Types of Security Policies• 4分钟
- Governance - The Policy Stack and Who Owns What• 2分钟
- Legal and Regulatory Landscape• 20分钟
- Building a Compliance Program That Scales• 3分钟
1个作业• 总计30分钟
- Module 2 Quiz• 30分钟
In this module, you'll discover why knowing what data you have is just as critical as protecting it—and how organizations regularly fail at both. You'll learn to classify data based on sensitivity and business value, from public marketing materials to highly regulated patient records, and understand how misclassification can lead to million-dollar breaches and compliance failures. Through examining real cases like the Equifax breach, you'll see how poor asset inventory and data lifecycle management create vulnerabilities that attackers exploit. By the end of this module, you'll be able to design data classification schemes that align with regulatory requirements and implement protection controls that match the actual risk and value of your organization's information assets. You'll also understand how modern tools like DLP, encryption, and automated discovery can help organizations maintain visibility and control over their data throughout its entire lifecycle.
涵盖的内容
1个视频5篇阅读材料1个作业
1个视频• 总计3分钟
- Data Classification• 3分钟
5篇阅读材料• 总计31分钟
- Introduction to Data Classification• 10分钟
- Data Lifecycle• 7分钟
- Data Classification Categories• 6分钟
- Data Protection Techniques• 4分钟
- Asset and Inventory Management• 4分钟
1个作业• 总计30分钟
- Module 3 Quiz• 30分钟
In this module, you'll explore one of cybersecurity's most overlooked yet critical areas: secure storage and data retention. You'll discover that protecting data doesn't end once it's collected—organizations must also secure where data "sleeps," control how long it stays, and ensure it's properly destroyed when no longer needed. Through three comprehensive lessons, you'll learn about data states (at rest, in motion, and in use), examine storage technologies from RAID systems to cloud platforms like AWS S3, and understand why proper data retention policies can mean the difference between regulatory compliance and costly violations. You'll also investigate real-world breaches like the 2019 Capital One incident to see how storage misconfigurations—not sophisticated attacks—often cause the most devastating data exposures. By the end of this module, you'll have the knowledge to design secure storage strategies, implement proper backup and destruction procedures, and navigate the complex regulatory landscape that governs how organizations must handle sensitive information throughout its entire lifecycle.
涵盖的内容
1个视频10篇阅读材料1个作业
1个视频• 总计5分钟
- Secure Storage, Retention, and Destruction• 5分钟
10篇阅读材料• 总计66分钟
- Why Secure Storage and Retention Matters• 10分钟
- Real-World Examples and Strategic Implementations• 3分钟
- Data States and Their Security Requirements• 10分钟
- Storage Technologies• 5分钟
- Data Retention Policies and Governance• 5分钟
- RAID and Redundancy for Storage Security• 5分钟
- Backup Strategies in Depth• 8分钟
- Secure Destruction and Media Sanitization• 10分钟
- Data Retention and Legal Holds• 5分钟
- Emerging Trends in Storage Security• 5分钟
1个作业• 总计30分钟
- Module 4 Quiz• 30分钟
In this module, you'll explore the foundational security principles that transform cybersecurity from reactive patching into proactive defense architecture. You'll examine how principles like Zero Trust, least privilege, segregation of duties, and defense in depth work together to create resilient systems that assume breach and design accordingly. Through hands-on experience with SELinux policy enforcement, you'll see how these abstract principles translate into real-world access controls that limit attack surfaces and enforce mandatory security boundaries. You'll analyze major breaches like Target, Colonial Pipeline, and Equifax to understand how failures in these design principles led to catastrophic outcomes that proper implementation could have prevented. By the end of this module, you'll be able to evaluate organizational security postures, design layered defense strategies, and apply these principles to modern challenges like cloud security and remote work environments. This foundational knowledge will serve as the blueprint for every security decision you make throughout your career, helping you build systems that are secure by design rather than accident.
涵盖的内容
1个视频10篇阅读材料1个作业
1个视频• 总计4分钟
- Designing for Security: The Blueprint of Cyber Defense• 4分钟
10篇阅读材料• 总计93分钟
- Why Security Models and Design Principles Matter• 10分钟
- Zero Trust Architecture (ZTA)• 8分钟
- The Rise of Zero Trust Architecture• 5分钟
- Segregation of Duties (SoD)• 10分钟
- Least Privilege• 10分钟
- Defense in Depth• 10分钟
- Integrating these Principles: A Unified Security Model• 5分钟
- Few Additional Security Principles• 15分钟
- Application of Security Models• 10分钟
- Application of Security Models (Continued)• 10分钟
1个作业• 总计30分钟
- Module 5 Quiz• 30分钟
In this module, you'll explore cryptography as both a technical discipline and a business-critical function that underpins the entire digital economy. You'll master the fundamental differences between symmetric and asymmetric encryption systems, understanding not just how they work mathematically, but why hybrid approaches like those used in TLS have become essential for balancing security with performance. Through detailed analysis of real-world failures—from Adobe's catastrophic key reuse to LinkedIn's unsalted password hashes—you'll learn to identify cryptographic vulnerabilities and their business consequences. You'll examine the intricate trust relationships within Public Key Infrastructure (PKI) and understand how failures like DigiNotar's compromise can cascade across entire digital ecosystems. By the end of this module, you'll be equipped to design cryptographic solutions that protect the four pillars of information assurance (confidentiality, integrity, authentication, and non-repudiation) while navigating the complex trade-offs between security, compliance requirements, and operational efficiency that define modern cybersecurity practice.
涵盖的内容
1个视频8篇阅读材料1个作业
1个视频• 总计3分钟
- Cryptography Fundamentals• 3分钟
8篇阅读材料• 总计64分钟
- Introduction to Cryptography• 6分钟
- Core Principles of Cryptography• 6分钟
- Symmetric Encryption• 10分钟
- Asymmetric Encryption• 6分钟
- Hashing and Integrity• 10分钟
- Digital Signatures• 10分钟
- Public Key Infrastructure (PKI)• 8分钟
- Secure Destruction and Cybersecurity in Practice• 8分钟
1个作业• 总计30分钟
- Module 6 Quiz• 30分钟
In this module, you'll explore the foundational architecture of digital communication by examining how network protocols create both opportunity and vulnerability in modern systems. You'll master the OSI and TCP/IP models not as abstract frameworks, but as practical lenses for understanding where attacks occur and defenses must be positioned across network layers. Through detailed analysis of secure protocols like IPSec, TLS, and SSH, you'll learn how trust is established and maintained across hostile networks, while examining real-world failures like Heartbleed and BGP hijacking that expose the fragility of our interconnected systems. You'll investigate the complex security challenges of IPv6 adoption, where dual-stack environments create expanded attack surfaces, and analyze how emerging protocols must balance performance with security in an era of IoT proliferation and 5G networks. By the end of this module, you'll understand networks as living ecosystems where protocols evolve reactively to threats, and you'll be equipped to design layered defense strategies that account for the inherent vulnerabilities at each level of the network stack.
涵盖的内容
1个视频10篇阅读材料1个作业
1个视频• 总计4分钟
- Network Protocols• 4分钟
10篇阅读材料• 总计72分钟
- Introduction to Network Protocols and Threats• 5分钟
- OSI Model - Security through Structured Thinking• 10分钟
- TCP/IP Model - From Theory to Reality• 8分钟
- IPv4 vs IPv6 - The Evolution of Addressing• 10分钟
- Secure Protocols - Building Trust on the Internet• 8分钟
- Threats Across Network Layers• 6分钟
- Case Studies - When Protocols Fail• 8分钟
- Defenses and Best Practices• 5分钟
- Emerging and Evolving Network Protocols• 10分钟
- Congratulations! • 2分钟
1个作业• 总计30分钟
- Module 7 Quiz• 30分钟
位教师

提供方

提供方

Founded in 1898, Northeastern is a global research university with a distinctive, experience-driven approach to education and discovery. The university is a leader in experiential learning, powered by the world’s most far-reaching cooperative education program. The spirit of collaboration guides a use-inspired research enterprise focused on solving global challenges in health, security, and sustainability.
从 Security 浏览更多内容
NNortheastern University
课程

课程
JJohns Hopkins University
课程
人们为什么选择 Coursera 来帮助自己实现职业发展

Felipe M.

Jennifer J.

Larry W.

Chaitanya A.
常见问题
To access the course materials, assignments and to earn a Certificate, you will need to purchase the Certificate experience when you enroll in a course. You can try a Free Trial instead, or apply for Financial Aid. The course may offer 'Full Course, No Certificate' instead. This option lets you see all course materials, submit required assessments, and get a final grade. This also means that you will not be able to purchase a Certificate experience.
When you purchase a Certificate you get access to all course materials, including graded assignments. Upon completing the course, your electronic Certificate will be added to your Accomplishments page - from there, you can print your Certificate or add it to your LinkedIn profile.
Yes. In select learning programs, you can apply for financial aid or a scholarship if you can’t afford the enrollment fee. If fin aid or scholarship is available for your learning program selection, you’ll find a link to apply on the description page.
更多问题
提供助学金,


