Virtual program of:edX |
Apply a safety mindset while remaining ethical.
Implement security design principles.
Explain the basic concepts of access control.
Implement reference monitors.
Enforce security policies that are commonly used in modern operating systems.
Analyze the security of a basic secure system.
Explain virtualization and the impact on security and efficiency.
8.
Think and work like an ethical penetration tester, implementing a repeatable and mature methodology that is tailored to each test.
Targeted, successfully identify vulnerabilities, rate their risk, and explain mitigations.
Responsibly disclose the findings in a professional report that can be used to recreate the exploit, explain the impact to the target, and prioritize each finding.
List the target hosts, domains, exposures, and attack surface.
Identify flaws and vulnerabilities in applications, websites, networks, systems, protocols, and configurations using manual techniques and assistive tools.
Reverse-engineered applications to discover exploitable weaknesses.
Write new exploits to test various types of vulnerabilities on clients, against servers, and to escalate privileges.
Demonstrate the fundamentals of secure network design.
Understand the issues related to providing secure networks.
Analyze the underlying cryptography needed for secure communications, authorization, and clearance.
List the issues related to the provision of secure networks.
Write new exploits to test various types of vulnerabilities on clients, against servers, and to escalate privileges.
Demonstrate the fundamentals of secure network design.
Understand the issues related to providing secure networks.
Analyze the underlying cryptography needed for secure communications, authorization, and clearance.
List the issues related to the provision of secure networks.
Write new exploits to test various types of vulnerabilities on clients, against servers, and to escalate privileges.
Demonstrate the fundamentals of secure network design.
Understand the issues related to providing secure networks.
Analyze the underlying cryptography needed for secure communications, authorization, and clearance.
List the issues related to the provision of secure networks.
1 year. 8 - 10 hours per week suggested.
9 high-quality virtual courses
This program will teach you core cybersecurity skills, including information security, network security, and penetration testing.
This exposure will allow the student to better understand the different employment opportunities available in the cybersecurity sector.
The demand for cybersecurity is skyrocketing both in the United States and around the world.
Courses will use both Python scripting and tool usage to give students hands-on experience in penetrating and defending systems.
In addition to applied cybersecurity labs, students will also gain an understanding of the complexity of defending business systems both today and in the future.
Students seeking careers in Information Technology, Risk Management, Cyber Defense, Cyber Threats, Cyber Crime, Digital Forensics, Incident Response, Computer Security, Computer Networking,
Whether you're looking to accelerate your career, earn a degree, or learn something for personal reasons, edX has the right courses for you.
Boost your career with college-backed credit programs and verified certificates.
Study and demonstrate knowledge at your preferred study time.
Try the courses before paying.
Learn alongside university partners and colleagues from around the world.
Expert NYUx faculty and instructors committed to high-quality virtual education.
Hello how can I help you? Are you interested in a course? About what subject?
Add a review