Pay as you go
- Maximum flexibility to learn at your own pace.
- Cancel anytime.
At 10 hours/week
Get access to the classroom immediately upon enrollment
Basics of Python, experience configuring AWS and Linux environments.
This course introduces the fundamental concepts and practices of security engineering. These are the basic principles and properties a security engineer will apply when evaluating, prioritizing and communicating security topics. Additionally, you’ll learn about the practical applications of cryptography. You will also learn about strategies for risk evaluation, security review and audit.
In this course, you’ll start by exploring the basics of system security and its implementation at the operating system level. You will learn about implementing authentication and authorization as a means to protect access to data and services. You will also learn about detecting unauthorized changes to a system and how to effectively counter them. By the end, you will understand how to build logging, monitoring and auditing tools that can alert you to system security breaches and how to effectively counter them in a real-world case.
In this course, you will be introduced to the industry best practices for security configurations and controls. You will perform an assessment that includes security benchmarks, configurations and controls. You will also scan the main infrastructure operating systems for vulnerabilities and produce a report based on an industry scenario. At the end of this course, you will be familiar with industry terminology and security best practices. You will also learn to perform vulnerability scans and produce industry-standard reports.
In this course, you will learn the basics of secure web application. You will start by learning about OWASP and the Top 10 list of vulnerabilities within web applications. You will also learn how to do Static code scans using special software and even how to manually test a web application. By the end of this course you will be able to work as a security expert that can help shape the security posture of the development team to help build more secure web applications.
Head of Information Security, Clearwater Analytics
Taylor is an information security leader with over 10 years experience building a wide range of security programs. Taylor is currently head of information security for Clearwater Analytics. Previously he was a leader in application security at Adobe.
Engineer/Consultant, Amazon Web Services
Abhinav is a cybersecurity researcher with nearly a decade of experience working for global leaders in security technology, financial institutions and as an independent consultant. He is the author of Metasploit Penetration Testing Cookbook and Instant Wireshark Starter, as well as many papers, articles, and blogs.
Principal Security Research Engineer, Splunk
Rod has over 15 years of experience in information technology and security. He has worked at Prolexic, Akamai, Caspida, and Splunk. He is the co-founder of HackMiami and the Pacific Hackers meetup and conferences.
VP of Product Innovation
Dev has worked in the cybersecurity field for more than 10 years, and is now VP of Product Innovation at one of the top cybersecurity companies. His area of expertise is red team and exploit development, with a focus on active cybersecurity defense.
Pay as you go
A well-prepared learner is already able to: