In this course, you'll continue developing your cybersecurity skills by implementing cybersecurity auditing, implementing a vulnerability management plan, assessing vulnerabilities, and conducting penetration testing. Then, you'll collect cybersecurity intelligence from both network-based and host-based sources. You'll also analyze log data using common Windows and Linux tools, as well as security information and event management (SIEM) tools.

CFR: Security Assessment, Data Collection, and Log Analysis

位教师:Bill Rosenthal
访问权限由 Coursera Learning Team 提供
您将学到什么
In this course, you will assess the organization's security posture, collect cybersecurity intelligence, and analyze log data.
您将获得的技能
- Information Systems Security
- Auditing
- Vulnerability Assessments
- Windows PowerShell
- Intelligence Collection and Analysis
- Security Information and Event Management (SIEM)
- Network Security
- Penetration Testing
- Cyber Attacks
- Data Collection
- Analysis
- Data Analysis
- Correlation Analysis
- Vulnerability Scanning
- Bash (Scripting Language)
- Cybersecurity
- Computer Security
- Network Analysis
- Vulnerability Management
- Linux Commands
- 技能部分已折叠。显示 7 项技能,共 20 项。
要了解的详细信息

添加到您的领英档案
1 项作业
January 2026
了解顶级公司的员工如何掌握热门技能

积累特定领域的专业知识
- 向行业专家学习新概念
- 获得对主题或工具的基础理解
- 通过实践项目培养工作相关技能
- 获得可共享的职业证书

该课程共有4个模块
Now that you've analyzed the threats to your organization and their attack process, you can assess just how prepared your current security posture is to defend against these threats. The assessment process includes multiple methods and tools that will assist you in identifying weak points in the organization. More importantly, assessment will reveal how to correct these weaknesses and mitigate risk in the organization.
涵盖的内容
1篇阅读材料6个插件
Even with the most thorough testing of a security infrastructure, at some point there will be problems. You may be able to stop them as they occur and before they cause any damage, or you may have to deal with investigation of an incident that you were unable to stop. Having good security intelligence at all times will help you keep your systems secure or make them secure again.
涵盖的内容
5个插件
Now that you've collected security intelligence from a wide variety of log-based sources, you can begin to dissect those logs to reveal key information about potential threats and vulnerabilities. Log analysis is a powerful process that can turn your security intelligence into actionable data.
涵盖的内容
4个插件
You'll wrap things up and then validate what you've learned in this course by taking an assessment.
涵盖的内容
1篇阅读材料1个作业
获得职业证书
将此证书添加到您的 LinkedIn 个人资料、简历或履历中。在社交媒体和绩效考核中分享。
位教师

提供方
人们为什么选择 Coursera 来帮助自己实现职业发展

Felipe M.

Jennifer J.

Larry W.







