Information Assurance Analysis

About this Specialization

This specialization is designed for post-graduate students aiming to advance their skills in AI, cybersecurity, & industrial control systems (ICS) security. Through three in-depth courses, you will explore AI safety, trust, security, privacy, and critical topics like AI governance, policy frameworks, and the impact of large language models (LLMs) such as ChatGPT. Also, you will gain a comprehensive understanding of (ICSs), including their architecture, security risks, and best practices for risk assessment and incident response. You will be equipped to address cybersecurity challenges within both AI and operational technology (OT) systems, secure industrial control networks, and manage the convergence of AI and cybersecurity in modern infrastructures. This program prepares you to navigate the evolving landscape of AI and ICS security, positioning you for roles that require expertise in securing both AI technologies and industrial networks. The specialization also covers malware, anti-virus, vulnerability principles, Internet of Things (IoT), Mobile Application Security, Border Gateway Protocols (BGP), anonymization, ICS, DNS Resource Record Types, and analyzing DNS, HTTP, SMTP, and TCP protocols. Tools include SiLK, NetFlow, Wireshark, IPTables, Splunk, Node-Red IoT framework, virtual machines, and TCPDump. Further exploration will include vulnerabilities and countermeasures for IT & OT protocols like WNAN, ZigBee, EMV, SIGFOX, CIP, MODBUS, DNP3, OPC, HART, BACnet, & ICCP.

Created by: Johns Hopkins University


Related Online Courses

By the end of this project, you will be ready to use Quizizz with your students to create gamified quizzes, polls, and lessons. Whether you are teaching online or in the classroom, Quizizz allows... more
The summer of 2020 has brought issues of equity and race to the forefront of society. How do we create tolerant and just climates at work? Changing the culture of an organization is challenging in... more
Welcome to Supply Chain Analytics - an exciting area that is in high demand! In this introductory course to Supply Chain Analytics, I will take you on a journey to this fascinating area that... more
Prepare for a career in the field of quality and process improvements and learn in-demand skills like Lean and Six Sigma methodologies and the DMAIC framework to get job-ready in less than 4... more
Malicious software, or malware, is typically delivered over a network and is designed to cause disruption to a computer, client, server, or network. Disruptions can include leaked private... more

CONTINUE SEARCH

FOLLOW COLLEGE PARENT CENTRAL