I’ve heard this before – “I’m not sure my computer security practices are working”. I reply “Have you tested them?” This course is the fourth and final course in the Practical Computer Security specialization. In this course, you’ll learn how to proactively test what you have put in place to protect your data. In the first week you’ll be able to discuss the basics of deterrents and how to “trick” attackers into believing they’ve hit a goldmine of data away from your real systems. In week 2, you’ll be able to understand and discuss the steps of penetration testing methodology. In week 3, you will be able to understand and apply what you have learned on your own systems to test whether your systems are secure or not. In week 4, we’ll discuss planning for your own methodology that you can apply to your own systems. And finally in week 5, we’ll finish up with a project that will allow you to test your skills in a safe environment.
About this Course
- 5 stars79.23%
- 4 stars13.98%
- 3 stars3.38%
- 2 stars1.69%
- 1 star1.69%
TOP REVIEWS FROM PROACTIVE COMPUTER SECURITY
One of the best course in the field of cyber security. One should must enroll for this if he/she interested in computer security.
It was really good & understandable course, Thank you very much
Excellent course! I learned a lot and thoroughly enjoyed it!
the course is support to how to develop in your computer skills
About the Cybersecurity for Business Specialization
Frequently Asked Questions
When will I have access to the lectures and assignments?
What will I get if I subscribe to this Specialization?
Is financial aid available?
More questions? Visit the Learner Help Center.