Explore how layered defenses transform cybersecurity. Apply cryptography, firewalls, and monitoring tools to detect intrusions, secure networks, and design mitigation strategies that keep data safe across complex digital environments.
Overview
Syllabus
- Introduction to Defending and Securing Systems
- Course introduction to Introduction to Defending and Securing Systems
- Defending Computer Systems and Security Principles
- In this lesson you will learn about best practices in defending computer systems.
- System Security: Securing Networks
- In this lesson you will learn how to secure networks.
- Monitoring and Logging for Detection of Malicious Activity
- In this lesson, you'll learn how to effectively monitor and use logs to detect malicious activity.
- Cryptography Basics (Applied Cryptography)
- In this lesson, you will learn the basics of cryptography and how to use tools to encrypt files.
- Monitoring and Securing the DFI Environment
- This lesson is the project lesson for Defending and Securing Systems course.
Taught by
Jerry Smith