Moocable is learner-supported. When you buy through links on our site, we may earn an affiliate commission.

Systems Security

via Udacity

Description

In this course, you will learn about implementing authentication and authorization You will learn how to build and utilize tools that can alert you to system security breaches and you'll know how to effectively counter them.

Tags

Syllabus

  • Introduction to Systems Security
    • In this lesson, you'll be introduced to the course and what to expect!
  • Third Party Vulnerabilities
    • In this lesson, you will start learning about third party vulnerabilities and how to protect against them.
  • Authentication
    • In this lesson, you will learn about password management tools, securing remote access, and encryption.
  • Authorization
    • In this lesson, you will learn about access control, ownership and permissions, and creating rules and filters.
  • Isolation
    • In this lesson, you will learn about restricting access, access control, and memory attacks.
  • Auditing
    • In this lesson, you will learn about logging and monitoring.
  • Responding to a Nation-State Cyber Attack
    • In this project, you will detect a threat, mitigate it, and harden a system in the aftermath of a nation-state cyber attack.

Online Course


Systems Security

via Udacity
Affiliate notice

In this course, you will learn about implementing authentication and authorization You will learn how to build and utilize tools that can alert you to system security breaches and you'll know how to effectively counter them.

  • Introduction to Systems Security
    • In this lesson, you'll be introduced to the course and what to expect!
  • Third Party Vulnerabilities
    • In this lesson, you will start learning about third party vulnerabilities and how to protect against them.
  • Authentication
    • In this lesson, you will learn about password management tools, securing remote access, and encryption.
  • Authorization
    • In this lesson, you will learn about access control, ownership and permissions, and creating rules and filters.
  • Isolation
    • In this lesson, you will learn about restricting access, access control, and memory attacks.
  • Auditing
    • In this lesson, you will learn about logging and monitoring.
  • Responding to a Nation-State Cyber Attack
    • In this project, you will detect a threat, mitigate it, and harden a system in the aftermath of a nation-state cyber attack.