Ir al contenido principalSkip to Xpert Chatbot

UC3Mx: Cyber Security Basics: A Hands-on Approach

4.3 stars
23 ratings

Learn how to think like a hacker, but behave as a security expert.

6 semanas
5–7 horas por semana
A tu ritmo
Avanza a tu ritmo
Gratis
Verificación opcional disponible

Hay una sesión disponible:

¡Ya se inscribieron 83,140! Una vez finalizada la sesión del curso, será archivadoAbre en una pestaña nueva.
Comienza el 5 nov

Sobre este curso

Omitir Sobre este curso

Are you tired of hearing that your computer has a virus? Or that your email account has been hacked? Now, is the time for you to protect yourself by understanding the basics of cyber security.

This computer science course presents an introduction to cyber security showing different aspects of this discipline. You will learn what the main existing cyber security threats are and how to protect yourself against them. The course presents a practical approach in which all required material will be provided to allow you to better understand attacks and establish appropriate countermeasures.

Taught by instructors with years of experience in the field of computer security, this course will pave the way to the security area of IT-related professions.

De un vistazo

  • Institution UC3Mx
  • Subject Informática
  • Level Intermediate
  • Prerequisites

    Users with basic knowledge of computer networks and operating systems. No prior knowledge of computer security is necessary.

  • Language English
  • Video Transcript English
  • Associated skillsComputer Science, Cyber Security, Computer Security

Lo que aprenderás

Omitir Lo que aprenderás
  • Cyber security landscape
  • Reverse engineering
  • Managing and monitoring network cyber security attacks
  • Computer forensics
  • Malware and advanced persistent threats
  • Vulnerability management and pentesting

Plan de estudios

Omitir Plan de estudios

Lecture 1. Cybersecurity: an overview
This lecture introduces the impact of cybersecurity nowadays, as well as some examples of cyberthreats that motivate the relevance of this area of study. Types of cyberthreats, such as cybercrime or cyberwarfare, are later described, together with an overview of the current cyberthreat landscape. Finally, some well-known cybersecurity events are presented.

Lecture 2. Computer forensics
This lecture introduces computer forensics, that is the technique focused on the analysis and preservation of evidences in a particular computer device after an attack occurs. Common forensic traces are defined, namely traces left by deleted files, hidden data and fake emails.

Lecture 3. Assembly programming: towards reversing
This lecture introduces the main concepts of reverse engineering, that is, the ability to take an executable element and try to figure out how it works. The definition of this technique is introduced. After some theoretical knowledge, examples of disassembling C codes and decompiling codes in different languages, namely Java and C, are presented.

Lecture 4. Cyberdefense
This lecture introduces the main concepts of cyberdefense together with common applied tools. After presenting this topic, firewalls are outlined. The following part involves the description of Intrusion Detection Systems (IDSs). Security Information and Event management (SIEM) systems, which refer to a general approach to manage cyberdefense, are finally presented.

Lecture 5. Malware and Advanced Persistent Threats (APTs)
This lecture explains the main concepts related to malware and Advanced Persistent Threats (APTs), together with the main techniques to achieve their identification. The definition and types of malware, APTs and some real cases are introduced.

Lecture 6. Vulnerabilities and exposures
This last lesson presents vulnerabilities description and management. It describes and gives examples of the most common vulnerabilities at software, network and web level. The definition, use and application of penetration testing (pentesting) are also presented, as well as some examples applying the well-known tool Metasploit. Repositories of vulnerabilities are finally introduced.

Testimonios de los estudiantes

Omitir Testimonios de los estudiantes

"This course covers all the main basic concepts on security. You will learn about cybersecurity, computer forensics, reverse engineering, malware, XSS, SQLi, etc... Don't get confused: although this course is oriented for basic and fundamental topics on security, it has a lot of knowledge from security experts. Very practical course, not only theoretical." Previous learner

¿Quién puede hacer este curso?

Lamentablemente, las personas residentes en uno o más de los siguientes países o regiones no podrán registrarse para este curso: Irán, Cuba y la región de Crimea en Ucrania. Si bien edX consiguió licencias de la Oficina de Control de Activos Extranjeros de los EE. UU. (U.S. Office of Foreign Assets Control, OFAC) para ofrecer nuestros cursos a personas en estos países y regiones, las licencias que hemos recibido no son lo suficientemente amplias como para permitirnos dictar este curso en todas las ubicaciones. edX lamenta profundamente que las sanciones estadounidenses impidan que ofrezcamos todos nuestros cursos a cualquier persona, sin importar dónde viva.

¿Te interesa este curso para tu negocio o equipo?

Capacita a tus empleados en los temas más solicitados con edX para Negocios.