Classbaze

Disclosure: when you buy through links on our site, we may earn an affiliate commission.

Real-Time Cyber Threat Detection and Mitigation

This course introduces real-time cyber security techniques and methods in the context of the TCP/IP protocol suites. Explanation of some basic TCP/IP securit...
4.7
4.7/5
(466 reviews)
9,527 students
Created by

8.9

Classbaze Grade®

N/A

Freshness

8.7

Popularity

8.7

Material

Real-Time Cyber Threat Detection and Mitigation
Platform: Coursera
Video: 4h 34m
Language: English

Best Computer Security and Networks classes:

Classbaze Rating

Classbaze Grade®

8.9 / 10

CourseMarks Score® helps students to find the best classes. We aggregate 18 factors, including freshness, student feedback and content diversity.

Freshness

Course content can become outdated quite quickly. After analysing 71,530 courses, we found that the highest rated courses are updated every year. If a course has not been updated for more than 2 years, you should carefully evaluate the course before enrolling.

Popularity

8.7 / 10
We analyzed factors such as the rating (4.7/5) and the ratio between the number of reviews and the number of students, which is a great signal of student commitment.

New courses are hard to evaluate because there are no or just a few student ratings, but Student Feedback Score helps you find great courses even with fewer reviews.

Material

8.7 / 10
Video Score: 8.3 / 10
The course includes 4h 34m video content. Courses with more videos usually have a higher average rating. We have found that the sweet spot is 16 hours of video, which is long enough to teach a topic comprehensively, but not overwhelming. Courses over 16 hours of video gets the maximum score.
The average video length is 4 hours 22 minutes of 81 Computer Security and Networks courses on Coursera.
Detail Score: 7.9 / 10

The top online course contains a detailed description of the course, what you will learn and also a detailed description about the instructor.

Extra Content Score: 9.8 / 10

Tests, exercises, articles and other resources help students to better understand and deepen their understanding of the topic.

This course contains:

18 articles.
0 resource.
0 exercise.
5 tests or quizzes.

In this page

About the course

This course introduces real-time cyber security techniques and methods in the context of the TCP/IP protocol suites. Explanation of some basic TCP/IP security hacks is used to introduce the need for network security solutions such as stateless and stateful firewalls. Learners will be introduced to the techniques used to design and configure firewall solutions such as packet filters and proxies to protect enterprise assets.

Perimeter solutions such as firewalls and intrusion prevention systems are shown to have significant drawbacks in common enterprise environments. The result of such weakness is shown to often exist as advanced persistent threats (APTs) from nation-state actors. Such attacks, as well as DDOS and third-party attacks, are shown to have potential solutions for modern enterprise.

What can you learn from this course?

What you need to start the course?

Basic knowledge of Computer Security and Networks is required to start this course, as this is an intermediate level course.

Who is this course is made for?

This course was made for intermediate-level students.

Are there coupons or discounts for Real-Time Cyber Threat Detection and Mitigation ? What is the current price?

Access to most course materials is FREE in audit mode on Coursera. If you wish to earn a certificate and access graded assignments, you must purchase the certificate experience during or after your audit.

If the course does not offer the audit option, you can still take a free 7-day trial.

Will I be refunded if I'm not satisfied with the Real-Time Cyber Threat Detection and Mitigation course?

Coursera offers a 7-day free trial for subscribers.

Are there any financial aid for this course?

YES, you can get a scholarship or Financial Aid for Coursera courses. The first step is to fill out an application about your educational background, career goals, and financial circumstances. Learn more about financial aid on Coursera.

Who will teach this course? Can I trust Dr. Edward G. Amoroso?

Dr. Edward G. Amoroso has created 4 courses that got 56 reviews which are generally positive. Dr. Edward G. Amoroso has taught 52,102 students and received a 4.83 average review out of 56 reviews. Depending on the information available, we think that Dr. Edward G. Amoroso is an instructor that you can trust.
Computer Science
New York University
Dr. Edward G. Amoroso is Chief Executive Officer of TAG Cyber LLC, a global cyber security advisory, training, consulting, and media services company supporting hundreds of major organizations across the world. Ed recently retired from AT&T after thirty-one years of service, beginning in Unix security R&D at Bell Labs and culminating as Senior Vice President and Chief Security Officer of AT&T from 2004 to 2016. He was elected an AT&T Fellow in 2010. Ed is Research Professor in the Computer Science Department at the NYU Tandon School of Engineering, and a Senior Advisor at the Applied Physics Laboratory at Johns Hopkins University. He is author of six books on cyber security, and dozens of major research and technical papers in peer-reviewed journals and conference proceedings. Ed has also been Adjunct Professor of Computer Science at the Stevens Institute of Technology for the past twenty-nine years, where he has introduced over three thousand graduate students to the topic of information security. Ed holds the BS degree in Physics from Dickinson College, the MS/PhD degrees in Computer Science from the Stevens Institute of Technology, and is a graduate of the Columbia Business School. He holds ten patents in cyber security technology, and he served previously on the Board of Directors for M&T Bank and the NSA Advisory Board. Ed’s work has been highlighted on CNN, the New York Times, and the Wall Street Journal. He has worked directly with four Presidential administrations on issues related to national security, critical infrastructure protection, and cyber policy. He and his wife Lee live in New Jersey and are the proud parents of three wonderfully successful Millennials.

8.9

Classbaze Grade®

N/A

Freshness

8.7

Popularity

8.7

Material

Platform: Coursera
Video: 4h 34m
Language: English

Classbaze recommendations for you