Cybersecurity Specialization

to Build -- and Break -- a Secure System

Earn a Certificate

  • Specialization via Coursera and University of Maryland, College Park
  • $245 for 7-8 months
  • 3-5 hours a week of effort
  • 4 courses + capstone project
0 Reviews
Rating based on 0 student reviews.

Learn More

☆☆☆☆☆ (0 Reviews)
To build -- and break -- a secure system
Credential Type
3-5 hours a week
7-8 months
This series will present students with a broad, multidisciplinary perspective on current topics in cybersecurity, with courses on cryptography, hardware security, software security, and usability, and a capstone course that puts them all together. The Specialization concludes with a Capstone project that allows you to apply the skills you've learned throughout the courses.
★★★☆☆ (9) 7 weeks 30th Apr, 2018
This course focuses on how to design and build secure systems with a human-centric focus. We will look at basic principles of human-computer interaction, and apply these insights to the design of secure systems with the goal of developing security measures that respect human performance and their goals within a system.
★★★★☆ (25) 6 weeks 30th Apr, 2018
This course we will explore the foundations of software security. We will consider important software vulnerabilities and attacks that exploit them -- such as buffer overflows, SQL injection, and session hijacking -- and we will consider defenses that prevent or mitigate these attacks, including advanced testing and program analysis techniques. Importantly, we take a "build security in" mentality, considering techniques at each phase of the development cycle that can be used to strengthen the security of software systems. Successful learners in this course typically have completed sophomore/junior-level undergraduate work in a technical field, have some familiarity with programming, ideally in C/C++ and one other "managed" program language (like ML or Java), and have prior exposure to algorithms. Students not familiar with these languages but with others can improve their skills through online web tutorials.
★★★★☆ (8) 7 weeks 30th Apr, 2018
Welcome to Cryptography! Cryptography is the practice and study of techniques for securing communications in the presence of third parties. You will learn how to protect information in order to ensure its integrity, confidentiality, authenticity, and non-repudiation. You will come out with a basic understanding of cryptographic concepts and how to apply them, implement secure protocols, key management concepts, key administration and validation, and Public Key Infrastructure. Course Objectives 1. Apply the fundamental concepts of cryptography 2. Describe the difference between symmetric and asymmetric cryptography 3. Define the basic requirements for cryptography 4. Identify processes to support secure protocols 5. Describe the process for implementing cryptographic systems 6. Define key management concepts 7. Define Public Key Infrastructure 8. Identify processes for key administration and validation 9. Describe the implementation of secure protocols
★★★☆☆ (11) 6 weeks 23rd Apr, 2018
In this course, we will study security and trust from the hardware perspective. Upon completing the course, students will understand the vulnerabilities in current digital system design flow and the physical attacks to these systems. They will learn that security starts from hardware design and be familiar with the tools and skills to build secure and trusted hardware.
☆☆☆☆☆ (0) 6 weeks 23rd Apr, 2018
This course presents an intensive experience during which students build a software system they intend to be secure, and then attempt to show that other students' projects are insecure, by finding flaws in them. A Note on Capstone Frequency: Please note that sessions of this Cybersecurity Capstone Project only run 3-4 times a year, depending on course team availability and learner interest. Please keep this in mind as you enroll into the Capstone program. While you will still be able to access certain elements of the course between sessions, you will not be able to submit assignments or be grouped into teams unless you are in an actively running session.
0 ratings
0 reviews


Receive email notifications about this credential.
Follow Cybersecurity

Class Central

Get personalized course recommendations, track subjects and courses with reminders, and more.