This specialization is designed for post-graduate students aiming to advance their skills in AI, cybersecurity, & industrial control systems (ICS) security. Through three in-depth courses, you will explore AI safety, trust, security, privacy, and critical topics like AI governance, policy frameworks, and the impact of large language models (LLMs) such as ChatGPT. Also, you will gain a comprehensive understanding of (ICSs), including their architecture, security risks, and best practices for risk assessment and incident response. You will be equipped to address cybersecurity challenges within both AI and operational technology (OT) systems, secure industrial control networks, and manage the convergence of AI and cybersecurity in modern infrastructures. This program prepares you to navigate the evolving landscape of AI and ICS security, positioning you for roles that require expertise in securing both AI technologies and industrial networks. The specialization also covers malware, anti-virus, vulnerability principles, Internet of Things (IoT), Mobile Application Security, Border Gateway Protocols (BGP), anonymization, ICS, DNS Resource Record Types, and analyzing DNS, HTTP, SMTP, and TCP protocols. Tools include SiLK, NetFlow, Wireshark, IPTables, Splunk, Node-Red IoT framework, virtual machines, and TCPDump. Further exploration will include vulnerabilities and countermeasures for IT & OT protocols like WNAN, ZigBee, EMV, SIGFOX, CIP, MODBUS, DNP3, OPC, HART, BACnet, & ICCP.

Discover new skills with 30% off courses from industry experts. Save now.


Information Assurance Analysis Specialization
AI-Driven Cybersecurity and Privacy Solutions. Gain expertise in AI, cybersecurity, and industrial control systems security, with a focus on privacy, governance, risk assessment, and incident response.

Instructor: Jason Crossland
Included with
(6 reviews)
Recommended experience
(6 reviews)
Recommended experience
What you'll learn
Learn how AI impacts cybersecurity, focusing on safety, trust, privacy, and policy governance for secure AI integration.
Understand industrial control systems' architecture, vulnerabilities, and cybersecurity controls to protect OT environments.
Explore advanced ICS security topics, such as supply chain risks, OT protocols, and cybersecurity mitigation strategies for real-world applications.
Overview
Skills you'll gain
- Malware Protection
- Intrusion Detection and Prevention
- Network Monitoring
- Network Routing
- Internet Of Things
- Information Systems Security
- Network Security
- Cybersecurity
- Email Security
- Network Protocols
- Threat Detection
- Infrastructure Security
- Application Security
- TCP/IP
- Large Language Modeling
- Threat Modeling
- Network Analysis
What’s included

Add to your LinkedIn profile
Advance your subject-matter expertise
- Learn in-demand skills from university and industry experts
- Master a subject or tool with hands-on projects
- Develop a deep understanding of key concepts
- Earn a career certificate from Johns Hopkins University

Specialization - 3 course series
What you'll learn
Understand the relationship between malware, vulnerabilities, and exploits, and identify major types of malware using catalogs and signatures.
Learn how to collect and analyze network traffic with NetFlow and tools like SiLK or Wireshark to detect and interpret potential threats.
Explore internet addressing fundamentals, including IPv4 and IPv6, and utilize tools like WHOIS and BGP routing for host and network lookups.
Gain practical experience in securing IoT environments by building frameworks, understanding privacy risks, and implementing security measures.
Skills you'll gain
What you'll learn
Understand anonymization methods, challenges, and legal considerations for ensuring data privacy in network traffic.
Recognize security threats in mobile applications, including risks from APIs and cloud-based services, and explore best practices for defense.
Analyze DNS, HTTP, and SMTP protocols to identify abnormal traffic patterns, enhancing the ability to detect potential cyber threats.
Capture and interpret TCP sessions to identify attack methods like sequence number spoofing and TCP scanning, using tools like TCPDump and Wireshark.
Skills you'll gain
What you'll learn
Learn how to assess and address safety, privacy, and security concerns in AI systems and their impact on cybersecurity.
Understand the legal and policy frameworks surrounding AI technologies and their application in industrial settings.
Gain expertise in securing industrial control systems (ICS), including PLC, SCADA, and DCS, and mitigating their vulnerabilities.
Explore advanced ICS security strategies, focusing on risk assessment, incident response, and securing OT protocols and supply chains.
Skills you'll gain
Earn a career certificate
Add this credential to your LinkedIn profile, resume, or CV. Share it on social media and in your performance review.
Instructor

Offered by
Why people choose Coursera for their career





Open new doors with Coursera Plus
Unlimited access to 10,000+ world-class courses, hands-on projects, and job-ready certificate programs - all included in your subscription
Advance your career with an online degree
Earn a degree from world-class universities - 100% online
Join over 3,400 global companies that choose Coursera for Business
Upskill your employees to excel in the digital economy
Frequently asked questions
The specialization is designed to be completed at your own pace, but on average, it is expected to take approximately 3 months to finish if you dedicate around 5 hours per week. However, as it is self-paced, you have the flexibility to adjust your learning schedule based on your availability and progress.
You are encouraged to take the courses in the recommended sequence to ensure a smoother learning experience, as each course builds on the knowledge and skills developed in the previous ones. However, you are not required to follow a specific order, and you can take the courses in the order that best suits your needs and prior knowledge.
This course is completely online, so there’s no need to show up to a classroom in person. You can access your lectures, readings and assignments anytime and anywhere via the web or your mobile device.
More questions
Financial aid available,