Network Security – Vulnerabilities and Threats

Fundamentals of Computer Network Security

Launch you career in cyber security.
This specialization in intended for IT professionals, computer programmers, managers, IT security professionals who like to move up ladder, who are seeking to develop network system security skills. Through four courses, we will cover the Design and Analyze Secure Networked Systems, Develop Secure Programs with Basic Cryptography and Crypto API, Hacking and Patching Web Applications, Perform Penetration Testing, and Secure Networked Systems with Firewall and IDS, which will prepare you to perform tasks as Cyber Security Engineer, IT Security Analyst, and Cyber Security Analyst.

Course 1 – Design and Analyze Secure Networked Systems

University of Colorado System
About this Course
In this MOOC, we will learn the basic cyber security concepts, how to identify vulnerabilities/threat in a network system. We will apply CIA basic security services in the triage of recent cyberattack incidents, such as OPM data breach. We will learn the risk management framework for analyzing the risks in a network system, and apply the basic security design principles to protect the data and secure computer systems. We will examine the trustworthiness of programs and data installed in our systems and show the proper way to verify their integrity and authenticity. We will apply principle of least privileges for controlling the shared access given to different groups of users and system processes. On Amazon Cloud instances, we will use GnuPG software to generate public/private key pair for signing/verifying documents and open source software, and for encrypting documents. We will learn how to publish software, the related signature and release key on web server and publish public key to PGP key server for others to retrieve. We will learn Public Key Infrastructure (PKI) and Linux utility to serve as a CA for an organization, learn how to sign certificate request for clients or servers in secure email and web applications.

Module 1 – Cybersecurity Concepts and Security Principles

In this module, we will introduce the basic cyber security concepts, enable you to identity root causes of vulnerabilities in a network system and distinguish them from the threats from both inside and outside. We will analyze the enabling factors of recent cyber attack incidences and discuss the basic security services for their defense and triage. We will introduce the risk management framework for analyzing the risks in a network system, and apply the basic security design principles to protect the data and secure the computer systems. Trust is critical and in the center of any secure systems. We will examine the source and authenticity of the programs and data installed in systems we used daily and show the proper way to check their integrity, and verify their authenticity.

Learning Objectives
• Judge vulnerabilities and threats
• Apply security analysis to cyber security incidences using method, opportunity, and motive
• Apply Confidentiality, Integrity, and Availability (CIA) basic services to analyze and design secure networked systems
• Apply Risk Managment Framework (RMF) to reduce the risks of systems
• Apply basic security design principles to reduce the system risks and derive protection requirements

1 Comment

  1. Adalberto dos Santos on March 7, 2020 at 2:57 pm

    The network analyst is responsible for network (equipment, server and client or yourself operating system and programs used) he also monitor invasive and misuse of network resources and define and maintain the the rules of use of company or yourself’s computing recources. He design and maintain the network security scheme including data security equipment (physical access) (unauthorized access) and client or yourself and server operating system. This professional propose and implemented and monitor the security policy regarding to the use of computational recources. He configure and networks. He constantly monitor new security related issue (new intrusion techniques, new security bugs found out on network products etc).he must to be in depth protocol knowledge where is included TCP.HTTP HTTPS. UDP FTP. And operating system. He must to know the programming tongue. He have to have a knowledge of configuration and updating rules in firewalls. He need to know the typical Internet protocol (Frame relay. X25 etc.ATM etc). The security analyst must to know how to use the network traffic monitoring tools including sniffer….the system administrator can delegates an a security analyst…. Can i consider you a team mate?hum?

Leave a Comment