Class Central is learner-supported. When you buy through links on our site, we may earn an affiliate commission.

Johns Hopkins University

Cybersecurity Fundamentals

Johns Hopkins University via Coursera

Overview

Save Big on Coursera Plus. 7,000+ courses at $160 off. Limited Time Only!
This Advanced Penetration Testing and Ethical Hacking course offers a deep dive into key cybersecurity concepts, providing you with hands-on experience in areas like penetration testing, cryptography, and social engineering. Through engaging modules, you will learn to conduct penetration tests using industry-standard methodologies, such as the Penetration Testing Execution Standard (PTES), and effectively communicate findings through professional reports and executive summaries. You’ll also gain a solid understanding of cryptographic principles, including public key infrastructure (PKI), while mastering techniques for ethical hacking and countering cryptographic attacks. Additionally, the course covers the art of information gathering and social engineering, equipping you to conduct reconnaissance and craft spear phishing attacks. With practical labs and real-world scenarios, this course will help you build the skills needed to protect mission-critical infrastructures and advance your career in cybersecurity.

Syllabus

  • Course Introduction
    • The specialization “Introduction to Ethical Hacking” helps you to master essential cybersecurity skills across three comprehensive courses. Begin with Cybersecurity Fundamentals, covering motives, penetration testing, cryptography, and information gathering and social engineering web exploitation, preparing you for diverse cybersecurity challenges.
  • Ideology/Motives/Behaviors (Purpose/Goals)
    • Discuss the components, content, audience, and purpose for writing a penetration test report/executive summary. Understand the types and generations of hackers, the psychology of hackers, why pen testing is important, the tools used, and the test preparation phases.
  • Penetration Testing Report & Executive Summary
    • Discussing the components, content, audience, and purpose for writing a penetration test report/executive summary.
  • Cryptography and PKI
    • Discusses and explores the concepts and properties of One-Way Hashes, Public Key Infrastructure, and Cryptography.
  • Information Gathering & Social Engineering
    • Discuss the purpose, goals, and methods of conducting information gathering. Covers the tactics and tools used to conduct social engineering activities against asset, person, or system.

Taught by

Jason Crossland

Reviews

Start your review of Cybersecurity Fundamentals

Never Stop Learning.

Get personalized course recommendations, track subjects and courses with reminders, and more.

Someone learning on their laptop while sitting on the floor.