I’ve heard this before – “I’m not sure my computer security practices are working”. I reply “Have you tested them?” This course is the fourth and final course in the Practical Computer Security specialization. In this course, you’ll learn how to proactively test what you have put in place to protect your data. In the first week you’ll be able to discuss the basics of deterrents and how to “trick” attackers into believing they’ve hit a goldmine of data away from your real systems. In week 2, you’ll be able to understand and discuss the steps of penetration testing methodology. In week 3, you will be able to understand and apply what you have learned on your own systems to test whether your systems are secure or not. In week 4, we’ll discuss planning for your own methodology that you can apply to your own systems. And finally in week 5, we’ll finish up with a project that will allow you to test your skills in a safe environment.
This course is part of the Cybersecurity for Business Specialization
14,348 already enrolled
Offered By


About this Course
6,360 recent views
Flexible deadlines
Reset deadlines in accordance to your schedule.
Shareable Certificate
Earn a Certificate upon completion
100% online
Start instantly and learn at your own schedule.
Course 4 of 4 in the
Beginner Level
Approx. 11 hours to complete
English
Could your company benefit from training employees on in-demand skills?
Try Coursera for BusinessFlexible deadlines
Reset deadlines in accordance to your schedule.
Shareable Certificate
Earn a Certificate upon completion
100% online
Start instantly and learn at your own schedule.
Course 4 of 4 in the
Beginner Level
Approx. 11 hours to complete
English
Could your company benefit from training employees on in-demand skills?
Try Coursera for BusinessOffered by
Syllabus - What you will learn from this course
3 hours to complete
Information Sharing and Threat Intelligence
3 hours to complete
3 videos (Total 28 min), 4 readings, 2 quizzes
2 hours to complete
Penetration Testing - Methodology
2 hours to complete
5 videos (Total 40 min), 2 readings, 2 quizzes
2 hours to complete
Common Pen Testing Tools
2 hours to complete
3 videos (Total 27 min), 2 readings, 2 quizzes
2 hours to complete
Proactive computer security management
2 hours to complete
4 videos (Total 35 min), 3 readings, 2 quizzes
Reviews
- 5 stars79.32%
- 4 stars13.92%
- 3 stars3.37%
- 2 stars1.68%
- 1 star1.68%
TOP REVIEWS FROM PROACTIVE COMPUTER SECURITY
by MJOct 22, 2019
Excellent course! I learned a lot and thoroughly enjoyed it!
by ASApr 22, 2020
Detailed and informative, I found the course to be well structured.
by MTSep 8, 2019
Very informative and instructive course. It's also the most challenging part of the course.
by DSNov 13, 2019
This course ended with some great hands on experience using Mutilisae 2
About the Cybersecurity for Business Specialization

Frequently Asked Questions
When will I have access to the lectures and assignments?
What will I get if I subscribe to this Specialization?
Is financial aid available?
More questions? Visit the Learner Help Center.