Pay as you go
- Maximum flexibility to learn at your own pace.
- Cancel anytime.
At 10 hours/week
Get access to the classroom immediately upon enrollment
Linux and AWS.
This course introduces the fundamental security planning, design, and systems thinking concepts that are used throughout security architecture. As networks and applications grow more complex, the need to identify potential sources of weakness that are a product of that complexity becomes crucial. Students who complete this course will be equipped with the skills to identify and evaluate risks in systems, assess whether or not risks are acceptable, and work alongside stakeholders to prioritize remediation efforts.
Identity and access control management is fundamental to the security of any organization. This course introduces the fundamentals needed to create and implement access control within an organization. Specifically, this course teaches the fundamentals of managing access control within cloud environments such as AWS. Students who complete this course will be equipped with the skills to design, implement, and enforce access control using different access control models. In doing so, they will be prepared to implement access control that is maintainable and aligns with the principle of least privilege.
This course covers infrastructure and network security concepts essential for designing and implementing secure infrastructure. Complex infrastructures can have multiple moving components connected over a network. A multi-layered security architecture is required to provide complete visibility of system and service behavior. This course covers aspects of architecting and building security alerting and monitoring services that are scalable throughout the enterprise.
This course introduces the fundamental incident response planning, design, and architecture concepts that are used in the cloud. As cloud solutions grow more complex so must the related incident response capabilities. Students who complete this course will be equipped with the skills to plan, design and execute a strong set of foundational cloud incident response capabilities.
Principal AI Researcher | Rapid7
Erick Galinkin is a hacker and scientist specializing in Applying Artificial Intelligence to Cybersecurity. He also conducts academic research on machine learning theory and the interplay between algorithmic game theory and information security.
Senior DevOps Engineer
Sjon-Paul Brown is a DevOps Engineer and DevOps Consultant who helps companies streamline and secure their cloud environments and development processes. He has formally worked with varying startups and enterprises to ensure to that software can be securely developed and deployed in an agile manner.
Abhinav is a cybersecurity researcher with nearly a decade of experience working for global leaders in security technology, financial institutions and as an independent consultant. He is the author of Metasploit Penetration Testing Cookbook and Instant Wireshark Starter, as well as many papers, articles, and blogs.
William serves as an SME for complex Information Assurance and Security Engineering efforts worldwide. He helps foster a better view into the globalized challenges of secure computing worldwide as a Global Digital Professional with intimate knowledge of both domestic and foreign network infrastructures.
Pay as you go
A well prepared student will be familiar with Linux and AWS and have some experience conducting administration with those platforms. Specifically, students should be able to: