Northeastern University
Systems and Cybersecurity Fundamentals Part 2

通过 Coursera Plus 解锁访问 10,000 多门课程。开始 7 天免费试用

Northeastern University

Systems and Cybersecurity Fundamentals Part 2

Ashutosh Sawant

位教师:Ashutosh Sawant

包含在 Coursera Plus

深入了解一个主题并学习基础知识。
1 周 完成
在 10 小时 一周
灵活的计划
自行安排学习进度
深入了解一个主题并学习基础知识。
1 周 完成
在 10 小时 一周
灵活的计划
自行安排学习进度

了解顶级公司的员工如何掌握热门技能

Petrobras, TATA, Danone, Capgemini, P&G 和 L'Oreal 的徽标

该课程共有7个模块

In this module, you'll explore how the traditional concept of network perimeter security has evolved from a simple "castle and moat" defense model to a complex, fluid ecosystem of distributed controls. You'll discover why the network perimeter has "dissolved" in the age of cloud computing and remote work, transforming from a fixed boundary into multiple micro-perimeters that travel with every device and connection. Through hands-on experience with pfSense firewalls and analysis of real-world failures like the Target breach, you'll learn how layered defense strategies combine firewalls, IDS/IPS systems, and Network Access Control to create resilient security architectures. You'll examine how endpoint security has become the new frontline of perimeter defense, where each laptop, smartphone, and IoT device represents both an opportunity and a vulnerability that must be continuously monitored and protected. By the end of this module, you'll understand how to design defense-in-depth strategies that balance the practical realities of legacy systems with emerging technologies like Zero Trust Network Access, preparing you to secure networks in an era where the perimeter is everywhere and nowhere at once.

涵盖的内容

3个视频11篇阅读材料1个作业

In today's digital landscape, identity has become the new security perimeter. Gone are the days when firewalls and network boundaries were enough to protect organizational assets—now, attackers target user credentials, session tokens, and identity systems to gain unauthorized access. This module explores the critical processes of authentication (proving who you are) and authorization (determining what you're allowed to do), which together form the foundation of modern access control and digital trust. You'll examine both technical mechanisms like multi-factor authentication, single sign-on, and session management, as well as governance models such as role-based access control and just-in-time access that make identity systems enforceable and auditable. Through real-world case studies like the SolarWinds breach and Twitter hack, you'll understand how weak identity controls lead to devastating consequences and why regulatory frameworks like GDPR, HIPAA, and PCI DSS demand strong authentication and authorization practices. By the end of this module, you'll be equipped to design and evaluate enterprise identity and access management frameworks that balance security, compliance, and business agility.

涵盖的内容

1个视频14篇阅读材料1个作业

In cybersecurity, privileged accounts represent the "keys to the kingdom"—granting access to critical systems, sensitive data, and administrative functions that, if compromised, can lead to catastrophic breaches. This module explores how organizations balance the need to empower employees with appropriate access against the critical requirement to limit risk through principles like least privilege, role-based access control (RBAC), and just-in-time (JIT) access. You'll examine why privilege management failures were central to major breaches like SolarWinds, Target, and Capital One, and learn how proper provisioning, deprovisioning, and access reviews can prevent attackers from escalating their access. Special attention will be given to service accounts—the often-overlooked machine identities that attackers actively exploit because they're frequently over-privileged and under-monitored. By the end of this module, you'll understand that effective privilege management isn't about restricting access—it's about giving the right access at the right time and revoking it when it's no longer needed.

涵盖的内容

1个视频9篇阅读材料1个作业

In this module, you'll shift from reactive incident response to proactive defense by mastering vulnerability assessment and penetration testing—the two most powerful strategies for identifying and addressing weaknesses before attackers exploit them. You'll learn to distinguish between vulnerability scanning, which provides broad coverage across your attack surface like a systematic building inspection, and penetration testing, which simulates real attacks to prove which vulnerabilities can actually be exploited and chained together for maximum impact. You'll develop the technical and strategic skills to design comprehensive vulnerability management programs. You'll explore the complete lifecycle from asset discovery through risk-based prioritization to remediation tracking, learning how to communicate findings effectively to both technical teams and executive leadership. By the end of this module, you'll understand how to think like both defender and adversary, integrating VA/PT processes into continuous monitoring and transforming security testing from a compliance checkbox into a strategic advantage that prevents breaches before they make headlines.

涵盖的内容

1个视频13篇阅读材料1个作业

In this module, you'll explore how organizations detect, respond to, and recover from cybersecurity incidents using structured methodologies and advanced monitoring technologies. You'll learn the complete incident response lifecycle—from preparation and detection through containment, eradication, and post-incident improvement—understanding how each phase contributes to minimizing business impact and preventing future attacks. You'll discover how security operations centers aggregate and correlate events across thousands of systems to identify patterns that signal potential breaches. You'll analyze real-world incidents to understand how proper preparation, effective tools, and coordinated teams make the difference between a contained incident and a catastrophic breach. By the end of this module, you'll be able to respond to security alerts systematically, use SIEM analytics to hunt for threats proactively, and communicate technical findings to both security teams and executive leadership in ways that drive organizational improvement.

涵盖的内容

1个视频12篇阅读材料1个作业

In today's software-driven world, security can no longer be treated as a final checkpoint before deployment—it must be woven into the fabric of every development decision from the first line of code to production release. This module explores how the Secure Software Development Lifecycle (SDLC) has evolved from an afterthought in traditional Waterfall methodologies to a core discipline in modern DevSecOps practices, where security gates, automated testing, and continuous monitoring operate at the speed of innovation. You'll examine how different development methodologies—from Agile to DevOps to DevSecOps—integrate security controls, and learn to design CI/CD pipelines that balance velocity with assurance through practices like threat modeling, static and dynamic testing (SAST/DAST), secrets management, and policy-as-code. The module culminates with the OWASP Top 10, a globally recognized framework that identifies the most critical web application vulnerabilities and provides a practical lens for applying secure development principles to real-world scenarios. By the end of this module, you'll understand that secure development isn't about slowing down innovation—it's about ensuring that every line of code, every deployment, and every architectural decision carries security attributes by design, creating systems that are resilient to attacks and capable of failing safely under stress.

涵盖的内容

1个视频12篇阅读材料1个作业

Welcome to the final module of your cybersecurity journey! Over the past thirteen weeks, you've built a comprehensive foundation in systems and cybersecurity fundamentals—from understanding the CIA Triad and compliance frameworks to mastering threat modeling, incident response, and secure software development. Now it's time to bring it all together. In this module, you'll step back and synthesize everything you've learned, moving from understanding individual topics to seeing how they interconnect as a complete cybersecurity ecosystem. You'll reflect on the core principles that have guided your learning: how confidentiality, integrity, and availability work together; how governance frameworks provide structure for security programs; how architecture and design principles create defensible systems; and how threat detection, incident response, and secure development practices protect organizations in the real world.

涵盖的内容

1个视频10篇阅读材料1个作业

位教师

Ashutosh Sawant
Northeastern University
2 门课程18 名学生

提供方

从 Security 浏览更多内容

人们为什么选择 Coursera 来帮助自己实现职业发展

Felipe M.
自 2018开始学习的学生
''能够按照自己的速度和节奏学习课程是一次很棒的经历。只要符合自己的时间表和心情,我就可以学习。'
Jennifer J.
自 2020开始学习的学生
''我直接将从课程中学到的概念和技能应用到一个令人兴奋的新工作项目中。'
Larry W.
自 2021开始学习的学生
''如果我的大学不提供我需要的主题课程,Coursera 便是最好的去处之一。'
Chaitanya A.
''学习不仅仅是在工作中做的更好:它远不止于此。Coursera 让我无限制地学习。'
Coursera Plus

通过 Coursera Plus 开启新生涯

无限制访问 10,000+ 世界一流的课程、实践项目和就业就绪证书课程 - 所有这些都包含在您的订阅中

通过在线学位推动您的职业生涯

获取世界一流大学的学位 - 100% 在线

加入超过 3400 家选择 Coursera for Business 的全球公司

提升员工的技能,使其在数字经济中脱颖而出

常见问题