What You Need to Know Before
You Start

Starts 4 June 2025 14:20

Ends 4 June 2025

00 days
00 hours
00 minutes
00 seconds
course image

Information Assurance Analysis

Enhance your expertise in AI, cybersecurity, and industrial control systems (ICS) security with this advanced specialization designed for post-graduate students. Delve into AI safety, trust, privacy, governance, policy frameworks, and the impact of large language models like ChatGPT, through three comprehensive courses. Gain a thorough unders.
Johns Hopkins University via Coursera

Johns Hopkins University

35 Courses


Johns Hopkins University is a globally recognized research university comprising 9 schools and campuses worldwide. It provides more than 260 degree programs, ranging from undergraduate to graduate and postdoctoral studies.

Not Specified

Optional upgrade avallable

All Levels

Progress at your own speed

Free

Optional upgrade avallable

Overview

Enhance your expertise in AI, cybersecurity, and industrial control systems (ICS) security with this advanced specialization designed for post-graduate students. Delve into AI safety, trust, privacy, governance, policy frameworks, and the impact of large language models like ChatGPT, through three comprehensive courses.

Gain a thorough understanding of ICS, tackling their architecture, security risks, and implementing best practices for risk assessment and incident response.

The program equips you to conquer cybersecurity challenges within AI and operational technology (OT) systems, secure industrial control networks, and manage AI and cybersecurity's intersection in modern infrastructures.

This specialization prepares you for roles demanding prowess in securing AI technologies and industrial networks, offering insights into malware, anti-virus strategies, vulnerability principles, IoT, Mobile Application Security, Border Gateway Protocols (BGP), and anonymization.

Explore and analyze DNS Resource Record Types, as well as DNS, HTTP, SMTP, and TCP protocols, using tools such as SiLK, NetFlow, Wireshark, IPTables, Splunk, and Node-Red IoT framework. Delve into vulnerabilities and countermeasures across IT & OT protocols like WNAN, ZigBee, EMV, SIGFOX, CIP, MODBUS, DNP3, OPC, HART, BACnet, & ICCP.


Subjects

united states