SlideShare a Scribd company logo
1 of 1
Download to read offline
5 Courses
Usable Security
Software Security
Hardware Security
Cryptography
Cybersecurity Capstone Project
Jennifer Golbeck, Ph.D.
College of Information
Studies
University of Maryland
Professor Michael Hicks
Department of
Computer Science
and the Maryland
Cybersecurity Center
(MC2)
University of Maryland,
College Park
Jonathan Katz, PhD
Professor
Department of
Computer Science
University of Maryland
Gang Qu, Professor
Director, Maryland
Embedded Systems and
Hardware Security Lab
Electrical and Computer
Engineering Department
University of Maryland,
College Park
November 20, 2015
Arpit Singh
has successfully completed the online, non-credit Specialization
Cybersecurity
A sequence of four 6-7 week courses followed by a culminating
6-week capstone course in which teams compete to build secure
systems, and find flaws in insecure ones.
The Cybersecurity Specialization covers the fundamental
concepts underlying the construction of secure systems, from the
hardware to the software to the human-computer interface, with
the use of cryptography to secure interactions. These concepts
are illustrated with examples drawn from modern practice, and
augmented with hands-on exercises involving relevant tools and
techniques. Successful participants will develop a way of thinking
that is security-oriented, better understanding how to think about
adversaries and how to build systems that defend against them.
Please note: The online courses of this specialization do not reflect the entire curriculum offered to students enrolled at the
University of Maryland at College Park. This statement does not affirm that this student was enrolled as a student at the
university; it does not confer a grade, credit, or degree from the university.
Verify this certificate at:
coursera.org/verify/specialization/ATUK8BDDSS9P

More Related Content

What's hot

CALL FOR PAPERS - 7th International Conference on Software Security (ICSS 2021)
CALL FOR PAPERS - 7th International Conference on Software Security (ICSS 2021)CALL FOR PAPERS - 7th International Conference on Software Security (ICSS 2021)
CALL FOR PAPERS - 7th International Conference on Software Security (ICSS 2021)ijp2p
 
6528 opensource intelligence as the new introduction in the graduate cybersec...
6528 opensource intelligence as the new introduction in the graduate cybersec...6528 opensource intelligence as the new introduction in the graduate cybersec...
6528 opensource intelligence as the new introduction in the graduate cybersec...Damir Delija
 
Greg Kinne - Bio
Greg Kinne - BioGreg Kinne - Bio
Greg Kinne - BioGreg Kinne
 
Machine Learning in Information Security by Mohammed Zuber
Machine Learning in Information Security by Mohammed ZuberMachine Learning in Information Security by Mohammed Zuber
Machine Learning in Information Security by Mohammed ZuberOWASP Delhi
 
Cognitive Analysis With SparkSecure
Cognitive Analysis With SparkSecureCognitive Analysis With SparkSecure
Cognitive Analysis With SparkSecureSparkCognition
 
Lecture #2: Defence Strategies and Techniques (Security): Part I
Lecture #2: Defence Strategies and Techniques (Security): Part ILecture #2: Defence Strategies and Techniques (Security): Part I
Lecture #2: Defence Strategies and Techniques (Security): Part IDr. Ramchandra Mangrulkar
 
Security and Privacy of Machine Learning
Security and Privacy of Machine LearningSecurity and Privacy of Machine Learning
Security and Privacy of Machine LearningPriyanka Aash
 
Machine learning techniques applied to detect cyber attacks on web applications
Machine learning techniques applied to detect cyber attacks on web applicationsMachine learning techniques applied to detect cyber attacks on web applications
Machine learning techniques applied to detect cyber attacks on web applicationsVenkat Projects
 
How to Use Artificial Intelligence to Minimize your Cybersecurity Attack Surface
How to Use Artificial Intelligence to Minimize your Cybersecurity Attack SurfaceHow to Use Artificial Intelligence to Minimize your Cybersecurity Attack Surface
How to Use Artificial Intelligence to Minimize your Cybersecurity Attack SurfaceSparkCognition
 
Telesoft Cyber Threat Hunting Infographic
Telesoft Cyber Threat Hunting InfographicTelesoft Cyber Threat Hunting Infographic
Telesoft Cyber Threat Hunting InfographicSarah Chandley
 
Certificate_MIT_Cybersecurity
Certificate_MIT_CybersecurityCertificate_MIT_Cybersecurity
Certificate_MIT_CybersecurityRiadh Amari
 
Threat Hunting - Moving from the ad hoc to the formal
Threat Hunting - Moving from the ad hoc to the formalThreat Hunting - Moving from the ad hoc to the formal
Threat Hunting - Moving from the ad hoc to the formalPriyanka Aash
 
Adversary Emulation and Its Importance for Improving Security Posture in Orga...
Adversary Emulation and Its Importance for Improving Security Posture in Orga...Adversary Emulation and Its Importance for Improving Security Posture in Orga...
Adversary Emulation and Its Importance for Improving Security Posture in Orga...Digit Oktavianto
 
Threat Hunting 101: Intro to Threat Detection and Incident Response
Threat Hunting 101: Intro to Threat Detection and Incident ResponseThreat Hunting 101: Intro to Threat Detection and Incident Response
Threat Hunting 101: Intro to Threat Detection and Incident ResponseInfocyte
 

What's hot (18)

CALL FOR PAPERS - 7th International Conference on Software Security (ICSS 2021)
CALL FOR PAPERS - 7th International Conference on Software Security (ICSS 2021)CALL FOR PAPERS - 7th International Conference on Software Security (ICSS 2021)
CALL FOR PAPERS - 7th International Conference on Software Security (ICSS 2021)
 
6528 opensource intelligence as the new introduction in the graduate cybersec...
6528 opensource intelligence as the new introduction in the graduate cybersec...6528 opensource intelligence as the new introduction in the graduate cybersec...
6528 opensource intelligence as the new introduction in the graduate cybersec...
 
Greg Kinne - Bio
Greg Kinne - BioGreg Kinne - Bio
Greg Kinne - Bio
 
Machine Learning in Information Security by Mohammed Zuber
Machine Learning in Information Security by Mohammed ZuberMachine Learning in Information Security by Mohammed Zuber
Machine Learning in Information Security by Mohammed Zuber
 
SocialUniversity:How Do Universities Use Social Media? An Empirical Survey of...
SocialUniversity:How Do Universities Use Social Media? An Empirical Survey of...SocialUniversity:How Do Universities Use Social Media? An Empirical Survey of...
SocialUniversity:How Do Universities Use Social Media? An Empirical Survey of...
 
Certificate_MIT
Certificate_MITCertificate_MIT
Certificate_MIT
 
Matrix Table
Matrix TableMatrix Table
Matrix Table
 
Cognitive Analysis With SparkSecure
Cognitive Analysis With SparkSecureCognitive Analysis With SparkSecure
Cognitive Analysis With SparkSecure
 
Lecture #2: Defence Strategies and Techniques (Security): Part I
Lecture #2: Defence Strategies and Techniques (Security): Part ILecture #2: Defence Strategies and Techniques (Security): Part I
Lecture #2: Defence Strategies and Techniques (Security): Part I
 
Security and Privacy of Machine Learning
Security and Privacy of Machine LearningSecurity and Privacy of Machine Learning
Security and Privacy of Machine Learning
 
Machine learning techniques applied to detect cyber attacks on web applications
Machine learning techniques applied to detect cyber attacks on web applicationsMachine learning techniques applied to detect cyber attacks on web applications
Machine learning techniques applied to detect cyber attacks on web applications
 
How to Use Artificial Intelligence to Minimize your Cybersecurity Attack Surface
How to Use Artificial Intelligence to Minimize your Cybersecurity Attack SurfaceHow to Use Artificial Intelligence to Minimize your Cybersecurity Attack Surface
How to Use Artificial Intelligence to Minimize your Cybersecurity Attack Surface
 
35
3535
35
 
Telesoft Cyber Threat Hunting Infographic
Telesoft Cyber Threat Hunting InfographicTelesoft Cyber Threat Hunting Infographic
Telesoft Cyber Threat Hunting Infographic
 
Certificate_MIT_Cybersecurity
Certificate_MIT_CybersecurityCertificate_MIT_Cybersecurity
Certificate_MIT_Cybersecurity
 
Threat Hunting - Moving from the ad hoc to the formal
Threat Hunting - Moving from the ad hoc to the formalThreat Hunting - Moving from the ad hoc to the formal
Threat Hunting - Moving from the ad hoc to the formal
 
Adversary Emulation and Its Importance for Improving Security Posture in Orga...
Adversary Emulation and Its Importance for Improving Security Posture in Orga...Adversary Emulation and Its Importance for Improving Security Posture in Orga...
Adversary Emulation and Its Importance for Improving Security Posture in Orga...
 
Threat Hunting 101: Intro to Threat Detection and Incident Response
Threat Hunting 101: Intro to Threat Detection and Incident ResponseThreat Hunting 101: Intro to Threat Detection and Incident Response
Threat Hunting 101: Intro to Threat Detection and Incident Response
 

Similar to Coursera Cybersecurity 2015

Get training in cyber security & place yourself in good companies through...
Get training in cyber security & place yourself in good companies through...Get training in cyber security & place yourself in good companies through...
Get training in cyber security & place yourself in good companies through...CCI Training Center
 
Get training in cyber security & place yourself in good companies through...
Get training in cyber security & place yourself in good companies through...Get training in cyber security & place yourself in good companies through...
Get training in cyber security & place yourself in good companies through...CCI Training Center
 
Unveiling the Hands-On Experience: Cyber Security Courses in Jaipur.pdf
Unveiling the Hands-On Experience: Cyber Security Courses in Jaipur.pdfUnveiling the Hands-On Experience: Cyber Security Courses in Jaipur.pdf
Unveiling the Hands-On Experience: Cyber Security Courses in Jaipur.pdfccasociety1
 
Hybrid Feature Classification Approach for Malicious JavaScript Attack Detect...
Hybrid Feature Classification Approach for Malicious JavaScript Attack Detect...Hybrid Feature Classification Approach for Malicious JavaScript Attack Detect...
Hybrid Feature Classification Approach for Malicious JavaScript Attack Detect...IJCSIS Research Publications
 
Exploring the Practical Skills You Gain from a CEH Course in Jaipur
Exploring the Practical Skills You Gain from a CEH Course in JaipurExploring the Practical Skills You Gain from a CEH Course in Jaipur
Exploring the Practical Skills You Gain from a CEH Course in JaipurCCASTraining
 
CISSP Certification Training Course
CISSP Certification Training CourseCISSP Certification Training Course
CISSP Certification Training CourseRicky Lionel Vaz
 
New threats to cyber-security
New threats to cyber-securityNew threats to cyber-security
New threats to cyber-securityMark Sherman
 
Syllabus for Cyber security and Ethical Hacking
Syllabus for Cyber security and Ethical HackingSyllabus for Cyber security and Ethical Hacking
Syllabus for Cyber security and Ethical HackingMehedi Hasan
 
Cybersecurity Analytics: Identifying and Mitigating Threats
Cybersecurity Analytics: Identifying and Mitigating ThreatsCybersecurity Analytics: Identifying and Mitigating Threats
Cybersecurity Analytics: Identifying and Mitigating Threatspriyanka rajput
 
Career Opportunities in Cyber Security
Career Opportunities in Cyber SecurityCareer Opportunities in Cyber Security
Career Opportunities in Cyber Securitystjohns9
 
Symantec Cyber Security Services: Security Simulation
Symantec Cyber Security Services: Security SimulationSymantec Cyber Security Services: Security Simulation
Symantec Cyber Security Services: Security SimulationSymantec
 
Cyber Defenders Flyer 2019
Cyber Defenders Flyer 2019Cyber Defenders Flyer 2019
Cyber Defenders Flyer 2019Vaibhav Bhandari
 
Exploration Draft Document- CEM Machine Learning & AI Project 2018
Exploration Draft Document- CEM Machine Learning & AI Project 2018Exploration Draft Document- CEM Machine Learning & AI Project 2018
Exploration Draft Document- CEM Machine Learning & AI Project 2018Leslie McFarlin
 
Prerequisites for Enrolling in an Ethical Hacking Course in Jaipur.pdf
Prerequisites for Enrolling in an Ethical Hacking Course in Jaipur.pdfPrerequisites for Enrolling in an Ethical Hacking Course in Jaipur.pdf
Prerequisites for Enrolling in an Ethical Hacking Course in Jaipur.pdfCCASTraining
 
Application Threat Modeling In Risk Management
Application Threat Modeling In Risk ManagementApplication Threat Modeling In Risk Management
Application Threat Modeling In Risk ManagementMel Drews
 
A review: Artificial intelligence and expert systems for cyber security
A review: Artificial intelligence and expert systems for cyber securityA review: Artificial intelligence and expert systems for cyber security
A review: Artificial intelligence and expert systems for cyber securitybijejournal
 
Cyber Security -Career and Job Opportunities after Msc.it
Cyber Security -Career and Job Opportunities after Msc.itCyber Security -Career and Job Opportunities after Msc.it
Cyber Security -Career and Job Opportunities after Msc.itSKIPS University
 
EC-Council Certified Network Defender
EC-Council Certified Network DefenderEC-Council Certified Network Defender
EC-Council Certified Network DefenderITpreneurs
 

Similar to Coursera Cybersecurity 2015 (20)

Coursera Cybersecurity 2015
Coursera Cybersecurity 2015Coursera Cybersecurity 2015
Coursera Cybersecurity 2015
 
Get training in cyber security & place yourself in good companies through...
Get training in cyber security & place yourself in good companies through...Get training in cyber security & place yourself in good companies through...
Get training in cyber security & place yourself in good companies through...
 
Get training in cyber security & place yourself in good companies through...
Get training in cyber security & place yourself in good companies through...Get training in cyber security & place yourself in good companies through...
Get training in cyber security & place yourself in good companies through...
 
Unveiling the Hands-On Experience: Cyber Security Courses in Jaipur.pdf
Unveiling the Hands-On Experience: Cyber Security Courses in Jaipur.pdfUnveiling the Hands-On Experience: Cyber Security Courses in Jaipur.pdf
Unveiling the Hands-On Experience: Cyber Security Courses in Jaipur.pdf
 
Hybrid Feature Classification Approach for Malicious JavaScript Attack Detect...
Hybrid Feature Classification Approach for Malicious JavaScript Attack Detect...Hybrid Feature Classification Approach for Malicious JavaScript Attack Detect...
Hybrid Feature Classification Approach for Malicious JavaScript Attack Detect...
 
Network Security Fundamentals
Network Security FundamentalsNetwork Security Fundamentals
Network Security Fundamentals
 
Exploring the Practical Skills You Gain from a CEH Course in Jaipur
Exploring the Practical Skills You Gain from a CEH Course in JaipurExploring the Practical Skills You Gain from a CEH Course in Jaipur
Exploring the Practical Skills You Gain from a CEH Course in Jaipur
 
CISSP Certification Training Course
CISSP Certification Training CourseCISSP Certification Training Course
CISSP Certification Training Course
 
New threats to cyber-security
New threats to cyber-securityNew threats to cyber-security
New threats to cyber-security
 
Syllabus for Cyber security and Ethical Hacking
Syllabus for Cyber security and Ethical HackingSyllabus for Cyber security and Ethical Hacking
Syllabus for Cyber security and Ethical Hacking
 
Cybersecurity Analytics: Identifying and Mitigating Threats
Cybersecurity Analytics: Identifying and Mitigating ThreatsCybersecurity Analytics: Identifying and Mitigating Threats
Cybersecurity Analytics: Identifying and Mitigating Threats
 
Career Opportunities in Cyber Security
Career Opportunities in Cyber SecurityCareer Opportunities in Cyber Security
Career Opportunities in Cyber Security
 
Symantec Cyber Security Services: Security Simulation
Symantec Cyber Security Services: Security SimulationSymantec Cyber Security Services: Security Simulation
Symantec Cyber Security Services: Security Simulation
 
Cyber Defenders Flyer 2019
Cyber Defenders Flyer 2019Cyber Defenders Flyer 2019
Cyber Defenders Flyer 2019
 
Exploration Draft Document- CEM Machine Learning & AI Project 2018
Exploration Draft Document- CEM Machine Learning & AI Project 2018Exploration Draft Document- CEM Machine Learning & AI Project 2018
Exploration Draft Document- CEM Machine Learning & AI Project 2018
 
Prerequisites for Enrolling in an Ethical Hacking Course in Jaipur.pdf
Prerequisites for Enrolling in an Ethical Hacking Course in Jaipur.pdfPrerequisites for Enrolling in an Ethical Hacking Course in Jaipur.pdf
Prerequisites for Enrolling in an Ethical Hacking Course in Jaipur.pdf
 
Application Threat Modeling In Risk Management
Application Threat Modeling In Risk ManagementApplication Threat Modeling In Risk Management
Application Threat Modeling In Risk Management
 
A review: Artificial intelligence and expert systems for cyber security
A review: Artificial intelligence and expert systems for cyber securityA review: Artificial intelligence and expert systems for cyber security
A review: Artificial intelligence and expert systems for cyber security
 
Cyber Security -Career and Job Opportunities after Msc.it
Cyber Security -Career and Job Opportunities after Msc.itCyber Security -Career and Job Opportunities after Msc.it
Cyber Security -Career and Job Opportunities after Msc.it
 
EC-Council Certified Network Defender
EC-Council Certified Network DefenderEC-Council Certified Network Defender
EC-Council Certified Network Defender
 

Coursera Cybersecurity 2015

  • 1. 5 Courses Usable Security Software Security Hardware Security Cryptography Cybersecurity Capstone Project Jennifer Golbeck, Ph.D. College of Information Studies University of Maryland Professor Michael Hicks Department of Computer Science and the Maryland Cybersecurity Center (MC2) University of Maryland, College Park Jonathan Katz, PhD Professor Department of Computer Science University of Maryland Gang Qu, Professor Director, Maryland Embedded Systems and Hardware Security Lab Electrical and Computer Engineering Department University of Maryland, College Park November 20, 2015 Arpit Singh has successfully completed the online, non-credit Specialization Cybersecurity A sequence of four 6-7 week courses followed by a culminating 6-week capstone course in which teams compete to build secure systems, and find flaws in insecure ones. The Cybersecurity Specialization covers the fundamental concepts underlying the construction of secure systems, from the hardware to the software to the human-computer interface, with the use of cryptography to secure interactions. These concepts are illustrated with examples drawn from modern practice, and augmented with hands-on exercises involving relevant tools and techniques. Successful participants will develop a way of thinking that is security-oriented, better understanding how to think about adversaries and how to build systems that defend against them. Please note: The online courses of this specialization do not reflect the entire curriculum offered to students enrolled at the University of Maryland at College Park. This statement does not affirm that this student was enrolled as a student at the university; it does not confer a grade, credit, or degree from the university. Verify this certificate at: coursera.org/verify/specialization/ATUK8BDDSS9P