Johns Hopkins University

Cybersecurity Fundamentals

Jason Crossland

Instructor: Jason Crossland

Included with Coursera Plus

Gain insight into a topic and learn the fundamentals.
Intermediate level

Recommended experience

31 hours to complete
3 weeks at 10 hours a week
Flexible schedule
Learn at your own pace
Gain insight into a topic and learn the fundamentals.
Intermediate level

Recommended experience

31 hours to complete
3 weeks at 10 hours a week
Flexible schedule
Learn at your own pace

What you'll learn

  • Understand the relationship between malware, vulnerabilities, and exploits, and identify major types of malware using catalogs and signatures.

  • Learn how to collect and analyze network traffic with NetFlow and tools like SiLK or Wireshark to detect and interpret potential threats.

  • Explore internet addressing fundamentals, including IPv4 and IPv6, and utilize tools like WHOIS and BGP routing for host and network lookups.

  • Gain practical experience in securing IoT environments by building frameworks, understanding privacy risks, and implementing security measures.

Details to know

Shareable certificate

Add to your LinkedIn profile

Recently updated!

December 2024

Assessments

12 assignments

Taught in English

See how employees at top companies are mastering in-demand skills

Placeholder

Build your subject-matter expertise

This course is part of the Information Assurance Analysis Specialization
When you enroll in this course, you'll also be enrolled in this Specialization.
  • Learn new concepts from industry experts
  • Gain a foundational understanding of a subject or tool
  • Develop job-relevant skills with hands-on projects
  • Earn a shareable career certificate
Placeholder
Placeholder

Earn a career certificate

Add this credential to your LinkedIn profile, resume, or CV

Share it on social media and in your performance review

Placeholder

There are 5 modules in this course

This course covers the identification and analysis of various malware types, vulnerabilities, and exploitation techniques, including the evaluation of antivirus (AV) solutions. Students will utilize NetFlow and the SiLK toolkit to monitor and analyze network traffic for security insights. Additionally, the course includes understanding addressing, BGP lookup, and the security considerations associated with Internet of Things (IoT) devices.

What's included

1 video2 readings

In this module, we will explore the intricacies of malware, vulnerabilities, and exploits. Students will learn to differentiate between faults, flaws, vulnerabilities, and exploits, utilize major malware catalogs, and understand the significance of signatures and polymorphism in malware identification. The course also covers key malware types and foundational exploitation techniques, including buffer overflows and SQL injections.

What's included

8 videos3 readings3 assignments

This module introduces the fundamental concepts of NetFlow, covering its major components, processes, and analysis principles. Students will learn how NetFlow is derived from network traffic, differentiate it from session data, and utilize tools like SiLK or Wireshark to collect and analyze router and PC traffic effectively.

What's included

4 videos5 readings3 assignments

This module explores the fundamentals of Internet space management, including the purchasing process, and the differences between IPv4 and IPv6 addressing. It delves into the structure of CIDR blocks, autonomous systems, and BGP routing. You'll also learn to use tools like WHOIS, looking glasses, and RIBS to gather host information.

What's included

6 videos3 readings3 assignments

This module explores the cybersecurity landscape of the Internet of Things (IoT), delving into NIST's trust concerns, IoT protocols, and the associated risks. Participants will understand privacy concerns, and risk mitigation strategies, and will gain hands-on experience in building an IoT framework and creating custom Node-Red flows using Docker containers.

What's included

3 readings3 assignments6 plugins

Instructor

Jason Crossland
Johns Hopkins University
9 Courses510 learners

Offered by

Recommended if you're interested in Security

Why people choose Coursera for their career

Felipe M.
Learner since 2018
"To be able to take courses at my own pace and rhythm has been an amazing experience. I can learn whenever it fits my schedule and mood."
Jennifer J.
Learner since 2020
"I directly applied the concepts and skills I learned from my courses to an exciting new project at work."
Larry W.
Learner since 2021
"When I need courses on topics that my university doesn't offer, Coursera is one of the best places to go."
Chaitanya A.
"Learning isn't just about being better at your job: it's so much more than that. Coursera allows me to learn without limits."

New to Security? Start here.

Placeholder

Open new doors with Coursera Plus

Unlimited access to 10,000+ world-class courses, hands-on projects, and job-ready certificate programs - all included in your subscription

Advance your career with an online degree

Earn a degree from world-class universities - 100% online

Join over 3,400 global companies that choose Coursera for Business

Upskill your employees to excel in the digital economy

Frequently asked questions