{"id":379119,"date":"2021-10-27T11:28:04","date_gmt":"2021-10-27T09:28:04","guid":{"rendered":"https:\/\/iotworlds.com\/%e5%85%b3%e4%ba%8e%e8%af%be%e7%a8%8b%e5%92%8c%e4%b9%8c%e4%bb%a3%e7%b1%b3%e7%9a%84%e6%9c%80%e4%bd%b3%e9%81%93%e5%be%b7%e9%bb%91%e5%ae%a2%e8%af%be%e7%a8%8b\/"},"modified":"2022-04-26T10:09:59","modified_gmt":"2022-04-26T08:09:59","slug":"%e5%85%b3%e4%ba%8e%e8%af%be%e7%a8%8b%e5%92%8c%e4%b9%8c%e4%bb%a3%e7%b1%b3%e7%9a%84%e6%9c%80%e4%bd%b3%e9%81%93%e5%be%b7%e9%bb%91%e5%ae%a2%e8%af%be%e7%a8%8b","status":"publish","type":"post","link":"https:\/\/iotworlds.com\/zh-hans\/%e5%85%b3%e4%ba%8e%e8%af%be%e7%a8%8b%e5%92%8c%e4%b9%8c%e4%bb%a3%e7%b1%b3%e7%9a%84%e6%9c%80%e4%bd%b3%e9%81%93%e5%be%b7%e9%bb%91%e5%ae%a2%e8%af%be%e7%a8%8b\/","title":{"rendered":"\u5173\u4e8e\u8bfe\u7a0b\u548c\u4e4c\u4ee3\u7c73\u7684\u6700\u4f73\u9053\u5fb7\u9ed1\u5ba2\u8bfe\u7a0b"},"content":{"rendered":"\n<p>\u9053\u5fb7\u9ed1\u5ba2\u662f\u4e00\u4e2a\u975e\u5e38\u4ee4\u4eba\u5174\u594b\u7684\u5b66\u4e60\u8def\u5f84\uff0c\u53ef\u5728\u7f51\u4e0a\u4e3a\u6709\u5174\u8da3\u7684\u53c2\u4e0e\u8005\u8c01\u60f3\u8981\u5b66\u4e60\u9053\u5fb7\u9ed1\u5ba2\u7684\u6280\u80fd\u3002 \u8fd9\u4e9b\u8bfe\u7a0b\u975e\u5e38\u9002\u5408\u5e0c\u671b\u4fdd\u62a4\u6570\u636e\u3001\u4fe1\u606f\u5e76\u514d\u53d7\u7f51\u7edc\u7f6a\u72af\u4fdd\u62a4\u7684\u4e2a\u4eba\u548c\u4f01\u4e1a\u3002<\/p>\n\n<h2 class=\"wp-block-heading\" id=\"h-google-cloud-security-professional-certificate\"><a href=\"https:\/\/imp.i384100.net\/c\/3308140\/1164545\/14726?u=https%3A%2F%2Fwww.coursera.org%2Fprofessional-certificates%2Fgoogle-cloud-security\" target=\"_blank\" rel=\"noreferrer noopener\">\u8c37\u6b4c\u4e91\u5b89\u5168\u4e13\u4e1a\u8bc1\u4e66<\/a><\/h2>\n\n<p>  \u672c\u8bfe\u7a0b\u7531 Google Cloud \u63d0\u4f9b\uff0c\u65e8\u5728\u4e3a\u53c2\u4e0e\u8005\u63d0\u4f9b\u8fdb\u5165\u52b3\u52a8\u529b\u5e02\u573a\u6240\u9700\u7684\u6280\u80fd\u3002 \u8fd9\u662f\u4e00\u95e8\u7279\u6b8a\u7684\u8bfe\u7a0b\uff0c\u5c06\u4fc3\u8fdb\u4e0a\u5e02\u5b66\u751f\u5728\u4e91\u5b89\u5168\u5de5\u7a0b\u5c97\u4f4d\u4e0a\u53d6\u5f97\u6210\u529f\u6240\u9700\u7684\u5b89\u5168\u4eba\u624d\u3002<\/p>\n\n<p>\u5b66\u4e60\u8005\u5c06\u51c6\u5907\u597d\u751f\u6210\u3001\u66f4\u65b0\u3001\u5220\u9664\u548c\u53d6\u6d88\u81ea\u5b9a\u4e49 IAM \u89d2\u8272 &#8211; \u5c31\u50cf\u4ed6\u4eec\u5728 Google \u4e91\u4e2d\u751f\u6210\u8bbf\u95ee\u5143\u7d20\u4e00\u6837\u3002<\/p>\n\n<h3 class=\"wp-block-heading\" id=\"h-skills-you-will-gain\">\u60a8\u5c06\u83b7\u5f97\u7684\u6280\u80fd\uff1a<\/h3>\n\n<ul class=\"wp-block-list\"><li>\u8c37\u6b4c\u8ba1\u7b97\u5f15\u64ce<\/li><li>\u4e91\u8ba1\u7b97<\/li><li>\u8c37\u6b4c\u5e94\u7528\u5f15\u64ce<\/li><li>\u521b\u5efa\u5e76\u7406\u89e3\u81ea\u5b9a\u4e49 IAM \u89d2\u8272<\/li><li>\u8c37\u6b4c\u4e91\u5e73\u53f0<\/li><li>\u4fdd\u62a4\u5e93\u4f2f\u5185\u7279\u73af\u5883<\/li><li>\u521b\u5efa\u548c\u914d\u7f6e\u7f51\u7edc\u5bf9\u89c6\u3002<\/li><\/ul>\n\n<h3 class=\"wp-block-heading\" id=\"h-below-are-the-main-courses\"><strong>\u4ee5\u4e0b\u662f\u4e3b\u8981\u8bfe\u7a0b\uff1a<\/strong><\/h3>\n\n<ul class=\"wp-block-list\"><li>\u8c37\u6b4c\u4e91\u5e73\u53f0\u57fa\u672c\u9762\uff1a\u6838\u5fc3\u57fa\u7840\u8bbe\u65bd<\/li><li>\u8c37\u6b4c\u4e91\u4e2d\u7684\u7f51\u7edc\uff1a\u5851\u9020\u548c\u5b9e\u73b0\u7f51\u7edc<\/li><li>\u8c37\u6b4c\u4e91\u4e2d\u7684\u7f51\u7edc\uff1a\u6df7\u5408\u5c5e\u6027\u548c\u7f51\u7edc\u7ba1\u7406<\/li><li>\u7ba1\u7406\u8c37\u6b4c\u5e73\u53f0\u7684\u5b89\u5168\u6027<\/li><li>\u8c37\u6b4c\u4e91\u4e2d\u7684\u5b89\u5168\u6700\u4f73\u5b9e\u8df5<\/li><li>\u7f13\u89e3\u8c37\u6b4c\u4e91\u5e73\u53f0\u4e0a\u7684\u5b89\u5168\u6f0f\u6d1e<\/li><li>\u8c37\u6b4c\u4e91\u4e2d\u5b89\u5168\u5de5\u7a0b\u5e08\u7684\u52a8\u624b\u5b9e\u9a8c\u5ba4<\/li><\/ul>\n\n<div class=\"wp-block-buttons is-horizontal is-content-justification-center is-layout-flex wp-container-core-buttons-is-layout-499968f5 wp-block-buttons-is-layout-flex\">\n<div class=\"wp-block-button\"><a class=\"wp-block-button__link\" href=\"https:\/\/imp.i384100.net\/c\/3308140\/1164545\/14726?u=https%3A%2F%2Fwww.coursera.org%2Fprofessional-certificates%2Fgoogle-cloud-security\" target=\"_blank\" rel=\"noreferrer noopener\">\u73b0\u5728\u6ce8\u518c<\/a><\/div>\n<\/div>\n\n<hr class=\"wp-block-separator\"\/>\n\n<h2 class=\"wp-block-heading\" id=\"h-cybersecurity-in-the-health-sector-coursera\"><a href=\"https:\/\/imp.i384100.net\/c\/3308140\/1164545\/14726?u=https%3A%2F%2Fwww.coursera.org%2Flearn%2Fcybersecurity-in-healthcare\" target=\"_blank\" rel=\"noreferrer noopener\">\u536b\u751f\u90e8\u95e8\u7684\u7f51\u7edc\u5b89\u5168\uff08\u8bfe\u7a0b\uff09<\/a><\/h2>\n\n<p>&#8220;\u533b\u7597\u4fdd\u5065\u4e2d\u7684\u7f51\u7edc\u5b89\u5168&#8221;\u8bfe\u7a0b\u65e8\u5728\u63d0\u9ad8\u4eba\u4eec\u5bf9\u7f51\u7edc\u5b89\u5168\u548c\u9053\u5fb7\u9ed1\u5ba2\u5728\u533b\u7597\u4fdd\u5065\uff08\u5982\u533b\u9662\u3001\u62a4\u7406\u4e2d\u5fc3\u3001\u8bca\u6240\u3001\u5176\u4ed6\u533b\u7597\u6216\u793e\u4f1a\u62a4\u7406\u673a\u6784\u548c\u670d\u52a1\u7ec4\u7ec7\uff09\u4e2d\u6240\u9762\u4e34\u6311\u6218\u7684\u8ba4\u8bc6\u548c\u7406\u89e3\u3002 \u672c\u8bfe\u7a0b\u9996\u5148\u4ecb\u7ecd\u533b\u7597\u4fdd\u5065\u670d\u52a1\u6570\u5b57\u5316\u5e26\u6765\u7684\u673a\u9047\u548c\u6311\u6218\u3002 \u5b83\u89e3\u91ca\u4e86\u6280\u672f\u7684\u5174\u8d77\u548c\uff08\u533b\u7597\uff09\u6570\u636e\u7684\u6fc0\u589e\u5982\u4f55\u6210\u4e3a\u7f51\u7edc\u7f6a\u72af\u7684\u6709\u5438\u5f15\u529b\u7684\u76ee\u6807\uff0c\u8fd9\u5bf9\u4e8e\u7406\u89e3\u4e3a\u4ec0\u4e48\u5728\u533b\u7597\u4fdd\u5065\u73af\u5883\u4e2d\u91c7\u53d6\u9002\u5f53\u7684\u7f51\u7edc\u5b89\u5168\u63aa\u65bd\u81f3\u5173\u91cd\u8981\u81f3\u5173\u91cd\u8981\u3002<\/p>\n\n<h3 class=\"wp-block-heading\">\u60a8\u5c06\u5b66\u5230\u4ec0\u4e48\uff1a<\/h3>\n\n<ul class=\"wp-block-list\"><li>\u60a8\u5c06\u4e86\u89e3\u6570\u5b57\u5316\u548c\u7f51\u7edc\u5b89\u5168\u5728\u533b\u7597\u4fdd\u5065\u73af\u5883\u4e2d\u7684\u4f5c\u7528<\/li><li>\u4e86\u89e3\u533b\u7597\u4fdd\u5065\u884c\u4e1a\u56e0\u6570\u5b57\u5316\u548c\uff08\u533b\u7597\uff09\u6570\u636e\u6fc0\u589e\u800c\u9762\u4e34\u7684\u673a\u4f1a\u548c\u5a01\u80c1<\/li><li>\u4e86\u89e3\u6539\u5584\u7f51\u7edc\u5b89\u5168\u548c\u4fdd\u6301\u6280\u672f\u4e0e\u4eba\u7c7b\u884c\u4e3a\u4e4b\u95f4\u4e92\u52a8\u7684\u4e0d\u540c\u65b9\u6cd5<\/li><li>\u60a8\u8fd8\u5c06\u53d1\u73b0\u79ef\u6781\u7684\u7f51\u7edc\u5b89\u5168\u6587\u5316\u5982\u4f55\u5f71\u54cd\u7ec4\u7ec7\u7684\u5b89\u5168\u6846\u67b6<\/li><\/ul>\n\n<h3 class=\"wp-block-heading\" id=\"h-skills-you-will-gain-1\"><strong>\u60a8\u5c06\u83b7\u5f97\u7684\u6280\u80fd<\/strong><\/h3>\n\n<ul class=\"wp-block-list\"><li>\u7f51\u7edc\u5b89\u5168<\/li><li>\u9053\u5fb7\u9ed1\u5ba2<\/li><li>\u533b\u9662\u7f51\u7edc\u5b89\u5168<\/li><li>\u4fe1\u606f\u5b89\u5168<\/li><li>\u62a4\u7406\u4e2d\u5fc3\u7684\u7f51\u7edc\u5b89\u5168<\/li><\/ul>\n\n<div class=\"wp-block-buttons is-horizontal is-content-justification-center is-layout-flex wp-container-core-buttons-is-layout-499968f5 wp-block-buttons-is-layout-flex\">\n<div class=\"wp-block-button\"><a class=\"wp-block-button__link\" href=\"https:\/\/imp.i384100.net\/c\/3308140\/1164545\/14726?u=https%3A%2F%2Fwww.coursera.org%2Flearn%2Fcybersecurity-in-healthcare\" target=\"_blank\" rel=\"noreferrer noopener\">\u73b0\u5728\u6ce8\u518c<\/a><\/div>\n<\/div>\n\n<hr class=\"wp-block-separator\"\/>\n\n<h3 class=\"wp-block-heading\"><strong>\u6559\u5b66\u5927\u7eb2 &#8211; \u60a8\u5c06\u4ece\u672c\u8bfe\u7a0b\u4e2d\u5b66\u5230\u4ec0\u4e48\uff1a<\/strong><\/h3>\n\n<ul class=\"wp-block-list\"><li>\u533b\u7597\u4fdd\u5065\u4e2d\u7684\u7f51\u7edc\u5b89\u5168\uff1a\u6280\u672f\u3001\u6570\u636e\u548c\u4eba\u7c7b\u884c\u4e3a<\/li><li>\u7f51\u7edc\u5b89\u5168\u7684\u793e\u4f1a\u65b9\u9762\uff1a\u793e\u4f1a\u5de5\u7a0b\u548c\u793e\u4ea4\u5a92\u4f53<\/li><li>\u533b\u7597\u4fdd\u5065\u4e2d\u7684\u6570\u636e\u6cc4\u9732\u3001\u9ed1\u5ba2\u548c\u6076\u610f\u8f6f\u4ef6<\/li><li>\u7f51\u7edc\u536b\u751f\uff1a\u6539\u5584\u7f51\u7edc\u5b89\u5168\u7684\u505a\u6cd5<\/li><li>\u5b89\u5168\u6587\u5316\uff1a\u521b\u9020\u79ef\u6781\u73af\u5883\uff0c\u5b9e\u8df5\u7f51\u7edc\u5b89\u5168  <\/li><\/ul>\n\n<h2 class=\"wp-block-heading\" id=\"h-cybersecurity-capstone-breach-response-case-studies\"><a href=\"https:\/\/imp.i384100.net\/c\/3308140\/1164545\/14726?u=https%3A%2F%2Fwww.coursera.org%2Flearn%2Fibm-cybersecurity-breach-case-studies\" target=\"_blank\" rel=\"noreferrer noopener\">\u7f51\u7edc\u5b89\u5168\u9876\u77f3\uff1a\u8fdd\u89c4\u54cd\u5e94\u6848\u4f8b\u7814\u7a76<\/a><\/h2>\n\n<p>\u672c\u8bfe\u7a0b\u7531 IBM \u63d0\u4f9b\uff0c\u65e8\u5728\u52a0\u5f3a\u7f51\u7edc\u5b89\u5168\u77e5\u8bc6\u53ca\u5176\u5bf9\u65e5\u5e38\u5b89\u5168\u5a01\u80c1\u7684\u5b9e\u65bd\u3002<\/p>\n\n<h3 class=\"wp-block-heading\" id=\"h-what-you-will-learn\">\u60a8\u5c06\u5b66\u5230\u4ec0\u4e48\uff1a<\/h3>\n\n<ul class=\"wp-block-list\"><li>\u7814\u7a76\u548c\u63cf\u8ff0\u6d47\u6c34\u5b54\u653b\u51fb\u3002<\/li><li>\u5bf9\u5f53\u524d\u7684\u7f51\u7edc\u653b\u51fb\u548c\u7834\u574f\u8fdb\u884c\u6848\u4f8b\u7814\u7a76\u3002<\/li><li>\u7814\u7a76\u548c\u63cf\u8ff0\u52d2\u7d22\u8f6f\u4ef6\u7684\u5a01\u80c1\u548c\u5bf9\u7ec4\u7ec7\u7684\u540e\u679c\u3002<\/li><li>\u5e94\u7528\u4e8b\u4ef6\u54cd\u5e94\u65b9\u6cd5\u3002<\/li><li>\u7814\u7a76\u548c\u63cf\u8ff0\u7b2c\u4e09\u65b9\u8fdd\u89c4\u4e8b\u4ef6\u53ca\u5176\u5bf9\u7ec4\u7ec7\u7684\u5f71\u54cd\u3002<\/li><li>\u63cf\u8ff0\u7f51\u7edc\u9493\u9c7c\u653b\u51fb\u7684\u5f71\u54cd\u3002  <\/li><li>\u7814\u7a76\u548c\u63cf\u8ff0\u9500\u552e\u70b9\u653b\u51fb\u548c\u6570\u636e\u6cc4\u9732\u7684\u5927\u81f4\u6210\u672c\u3002<\/li><\/ul>\n\n<h3 class=\"wp-block-heading\" id=\"h-skills-you-will-gain-2\">\u60a8\u5c06\u83b7\u5f97\u7684\u6280\u80fd<\/h3>\n\n<ul class=\"wp-block-list\"><li>\u5b89\u5168\u5206\u6790<\/li><li>\u7f51\u7edc\u5b89\u5168<\/li><li>\u9053\u5fb7\u9ed1\u5ba2<\/li><li>\u7f51\u7edc\u653b\u51fb\u6280\u80fd<\/li><li>\u8ba1\u7b97\u673a\u5b89\u5168\u4e8b\u4ef6\u7ba1\u7406<\/li><li>\u8fdd\u89c4\uff08\u5b89\u5168\u6f0f\u6d1e\uff09<\/li><\/ul>\n\n<h3 class=\"wp-block-heading\"><strong>\u6559\u5b66\u5927\u7eb2 &#8211; \u60a8\u5c06\u4ece\u672c\u8bfe\u7a0b\u4e2d\u5b66\u5230\u4ec0\u4e48\uff1a<\/strong><\/h3>\n\n<ul class=\"wp-block-list\"><li>\u4e8b\u4ef6\u7ba1\u7406\u54cd\u5e94\u548c\u7f51\u7edc\u653b\u51fb\u6846\u67b6<\/li><li>\u7f51\u7edc\u9493\u9c7c\u8bc8\u9a97<\/li><li>\u9500\u552e\u70b9\u8fdd\u89c4<\/li><li>\u7b2c\u4e09\u65b9\u8fdd\u53cd<\/li><li>\u52d2\u7d22\u8f6f\u4ef6<\/li><li>\u5e94\u7528\u60a8\u7684\u6280\u80fd = \u6570\u636e\u6cc4\u9732<\/li><\/ul>\n\n<div class=\"wp-block-buttons is-horizontal is-content-justification-center is-layout-flex wp-container-core-buttons-is-layout-499968f5 wp-block-buttons-is-layout-flex\">\n<div class=\"wp-block-button\"><a class=\"wp-block-button__link\" href=\"https:\/\/imp.i384100.net\/c\/3308140\/1164545\/14726?u=https%3A%2F%2Fwww.coursera.org%2Flearn%2Fibm-cybersecurity-breach-case-studies\" target=\"_blank\" rel=\"noreferrer noopener\">\u73b0\u5728\u6ce8\u518c<\/a><\/div>\n<\/div>\n\n<hr class=\"wp-block-separator\"\/>\n\n<h2 class=\"wp-block-heading\" id=\"h-network-security-and-database-vulnerabilities\"><a href=\"https:\/\/imp.i384100.net\/c\/3308140\/1164545\/14726?u=https%3A%2F%2Fwww.coursera.org%2Flearn%2Fnetwork-security-database-vulnerabilities\" target=\"_blank\" rel=\"noreferrer noopener\">\u7f51\u7edc\u5b89\u5168\u548c\u6570\u636e\u5e93\u6f0f\u6d1e<\/a><\/h2>\n\n<p>\u672c\u8bfe\u7a0b\u4e3a\u60a8\u63d0\u4f9b\u4e86\u4e86\u89e3\u57fa\u672c\u7f51\u7edc\u5b89\u5168\u6240\u9700\u7684\u80cc\u666f\u3002 \u60a8\u5c06\u4e86\u89e3\u5c40\u57df\u7f51\u3001TCP\/IP\u3001OSI \u6846\u67b6\u3001\u7f51\u7edc\u5982\u4f55\u5f71\u54cd\u7ec4\u7ec7\u5185\u7684\u5b89\u5168\u7cfb\u7edf\u4ee5\u53ca\u4fdd\u62a4\u7ec4\u7ec7\u514d\u53d7\u7f51\u7edc\u5b89\u5168\u653b\u51fb\u7684\u7f51\u7edc\u7ec4\u4ef6\u3002<\/p>\n\n<p>\u9664\u4e86\u8054\u7f51\u4e4b\u5916\uff0c\u60a8\u8fd8\u5c06\u4e86\u89e3\u6570\u636e\u5e93\u6f0f\u6d1e\u4ee5\u53ca\u7814\u7a76\u5404\u79cd\u6570\u636e\u5e93\uff08\u5305\u62ec SQL \u6ce8\u5165\u3001\u7532\u9aa8\u6587\u3001\u8499\u53e4\u548c\u6c99\u53d1\uff09\u6570\u636e\u5e93\u6f0f\u6d1e\u6240\u9700\u7684\u5de5\u5177\/\u77e5\u8bc6\u3002 \u60a8\u5c06\u4e86\u89e3\u4e0e\u5b9a\u4e49\u6807\u51c6\u5e76\u63d0\u4f9b\u7f51\u7edc\u5b89\u5168\u4e13\u4e1a\u4eba\u5458\u5de5\u5177\u7684\u6570\u636e\u5e93\u548c\u7ec4\u7ec7\u76f8\u5173\u7684\u5404\u79cd\u5b89\u5168\u6f0f\u6d1e\u7c7b\u578b\u3002 \u672c\u8bfe\u7a0b\u9762\u5411\u4efb\u4f55\u5e0c\u671b\u57fa\u672c\u4e86\u89e3\u7f51\u7edc\u5b89\u5168\/\u6570\u636e\u5e93\u6f0f\u6d1e\u548c\u9053\u5fb7\u9ed1\u5ba2\u6280\u80fd\u7684\u4eba\u3002<\/p>\n\n<h3 class=\"wp-block-heading\" id=\"h-what-you-will-learn-1\">\u60a8\u5c06\u5b66\u5230\u4ec0\u4e48\uff1a<\/h3>\n\n<ul class=\"wp-block-list\"><li>\u4e86\u89e3\u56f4\u7ed5 TCP\/IP \u548c OSI \u6a21\u578b\u7684\u7f51\u7edc\u57fa\u7840\u77e5\u8bc6\u3002<\/li><li>\u9053\u5fb7\u9ed1\u5ba2\u539f\u5219\u548c\u7b56\u7565<\/li><li>\u91cd\u65b0\u8ba1\u7b97 DNS\u3001DHCP\u3001\u5207\u6362\u548c\u8def\u7531\u6982\u5ff5\u3002<\/li><li>\u4e86\u89e3 IP \u5bfb\u5740\u3001\u7f51\u7edc\u5730\u5740\u7ffb\u8bd1\u548c\u6570\u636e\u5305\u55c5\u63a2\u3002<\/li><li>\u63cf\u8ff0\u7f51\u7edc\u5b89\u5168\u5173\u952e\u6570\u636e\u5e93\u7684\u7ed3\u6784\u548c\u6f0f\u6d1e\uff0c\u5305\u62ec SQL\u3001\u6c99\u53d1\u3001\u7532\u9aa8\u6587\u548c\u8499\u54e5\u5fb7\u3002<\/li><\/ul>\n\n<h3 class=\"wp-block-heading\" id=\"h-skills-you-will-gain-3\">\u60a8\u5c06\u83b7\u5f97\u7684\u6280\u80fd\uff1a<\/h3>\n\n<ul class=\"wp-block-list\"><li>\u6570\u636e\u5e93\u6f0f\u6d1e<\/li><li>\u9053\u5fb7\u9ed1\u5ba2<\/li><li>\u7f51\u7edc\u5b89\u5168<\/li><li>Sql \u6ce8\u5c04<\/li><li>\u7f51\u7edc\u5b89\u5168<\/li><li>\u7f51\u7edc\u57fa\u7840\u77e5\u8bc6<\/li><\/ul>\n\n<h3 class=\"wp-block-heading\" id=\"h-syllabus-what-you-will-learn-from-this-course\"><strong>\u6559\u5b66\u5927\u7eb2 &#8211; \u60a8\u5c06\u4ece\u672c\u8bfe\u7a0b\u4e2d\u5b66\u5230\u4ec0\u4e48\uff1a<\/strong><\/h3>\n\n<ul class=\"wp-block-list\"><li>TCP\/IP \u6846\u67b6<\/li><li>IP \u5bfb\u5740\u548c OSI \u6a21\u578b\u7684\u57fa\u7840\u77e5\u8bc6<\/li><li>\u6570\u636e\u5e93\u7b80\u4ecb<\/li><li>\u6df1\u5ea6\u6f5c\u6c34 &#8211; \u6ce8\u5c04\u6f0f\u6d1e<\/li><\/ul>\n\n<div class=\"wp-block-buttons is-horizontal is-content-justification-center is-layout-flex wp-container-core-buttons-is-layout-499968f5 wp-block-buttons-is-layout-flex\">\n<div class=\"wp-block-button\"><a class=\"wp-block-button__link\" href=\"https:\/\/imp.i384100.net\/c\/3308140\/1164545\/14726?u=https%3A%2F%2Fwww.coursera.org%2Flearn%2Fnetwork-security-database-vulnerabilities\" target=\"_blank\" rel=\"noreferrer noopener\">\u73b0\u5728\u6ce8\u518c<\/a><\/div>\n<\/div>\n\n<hr class=\"wp-block-separator\"\/>\n\n<h2 class=\"wp-block-heading\" id=\"h-penetration-testing-incidents-and-response-forensics\"><a href=\"https:\/\/imp.i384100.net\/c\/3308140\/1164545\/14726?u=https%3A%2F%2Fwww.coursera.org%2Flearn%2Fibm-penetration-testing-incident-response-forensics\" target=\"_blank\" rel=\"noreferrer noopener\">\u6e17\u900f\u6d4b\u8bd5\u3001\u4e8b\u4ef6\u548c\u54cd\u5e94\u53d6\u8bc1<\/a><\/h2>\n\n<p>\u672c\u8bfe\u7a0b\u4e3a\u60a8\u63d0\u4f9b\u83b7\u5f97\u7f51\u7edc\u5b89\u5168\u6280\u80fd\u6240\u9700\u7684\u80cc\u666f\uff0c\u4f5c\u4e3a\u7f51\u7edc\u5b89\u5168\u5b89\u5168\u5206\u6790\u5e08\u4e13\u4e1a\u8bc1\u4e66\u8ba1\u5212\u7684\u4e00\u90e8\u5206\u3002<\/p>\n\n<p>\u60a8\u5c06\u4e86\u89e3\u4e0d\u540c\u7684\u6e17\u900f\u6d4b\u8bd5\u9636\u6bb5\uff0c\u4e3a\u60a8\u7684\u6e17\u900f\u6d4b\u8bd5\u6536\u96c6\u6570\u636e\uff0c\u4ee5\u53ca\u6d41\u884c\u7684\u6e17\u900f\u6d4b\u8bd5\u5de5\u5177\u3002 \u6b64\u5916\uff0c\u60a8\u8fd8\u5c06\u4e86\u89e3\u4e8b\u4ef6\u54cd\u5e94\u9636\u6bb5\u3001\u8981\u6536\u96c6\u7684\u91cd\u8981\u6587\u6863\u4ee5\u53ca\u4e8b\u4ef6\u54cd\u5e94\u7b56\u7565\u548c\u56e2\u961f\u7ec4\u4ef6\u3002 \u6700\u540e\uff0c\u60a8\u5c06\u4e86\u89e3\u53d6\u8bc1\u8fc7\u7a0b\u4e2d\u7684\u5173\u952e\u6b65\u9aa4\u548c\u8981\u6536\u96c6\u7684\u91cd\u8981\u6570\u636e\u3002 \u672c\u8bfe\u7a0b\u8fd8\u8ba9\u60a8\u9996\u5148\u4e86\u89e3\u811a\u672c\u548c\u5bf9\u7cfb\u7edf\u5206\u6790\u5458\u7684\u91cd\u8981\u6027\u3002 \u672c\u8bfe\u7a0b\u9762\u5411\u4efb\u4f55\u5e0c\u671b\u83b7\u5f97\u7f51\u7edc\u5b89\u5168\u57fa\u672c\u4e86\u89e3\u5e76\u638c\u63e1\u7f51\u7edc\u5b89\u5168\u9886\u57df\u7f51\u7edc\u5b89\u5168\u5206\u6790\u5e08\u6280\u80fd\u7684\u4eba\u3002<\/p>\n\n<h3 class=\"wp-block-heading\" id=\"h-skills-you-will-gain-4\">\u60a8\u5c06\u83b7\u5f97\u7684\u6280\u80fd\uff1a<\/h3>\n\n<ul class=\"wp-block-list\"><li>\u811a\u672c<\/li><li>\u53d6\u8bc1<\/li><li>\u6e17\u900f\u6d4b\u8bd5<\/li><li>\u9053\u5fb7\u9ed1\u5ba2\u539f\u5219\u548c\u7b56\u7565<\/li><li>\u7f51\u7edc\u5b89\u5168<\/li><li>\u8ba1\u7b97\u673a\u5b89\u5168\u4e8b\u4ef6\u7ba1\u7406<\/li><\/ul>\n\n<h3 class=\"wp-block-heading\" id=\"h-syllabus-what-you-will-learn-from-this-course-1\"><strong>\u6559\u5b66\u5927\u7eb2 &#8211; \u60a8\u5c06\u4ece\u672c\u8bfe\u7a0b\u4e2d\u5b66\u5230\u4ec0\u4e48\uff1a<\/strong><\/h3>\n\n<ul class=\"wp-block-list\"><li>\u6e17\u900f\u6d4b\u8bd5<\/li><li>\u4e8b\u4ef6\u54cd\u5e94<\/li><li>\u6570\u5b57\u53d6\u8bc1<\/li><li>\u811a\u672c\u7b80\u4ecb<\/li><\/ul>\n\n<div class=\"wp-block-buttons is-horizontal is-content-justification-center is-layout-flex wp-container-core-buttons-is-layout-499968f5 wp-block-buttons-is-layout-flex\">\n<div class=\"wp-block-button\"><a class=\"wp-block-button__link\" href=\"https:\/\/imp.i384100.net\/c\/3308140\/1164545\/14726?u=https%3A%2F%2Fwww.coursera.org%2Flearn%2Fibm-penetration-testing-incident-response-forensics\" target=\"_blank\" rel=\"noreferrer noopener\">\u73b0\u5728\u6ce8\u518c<\/a><\/div>\n<\/div>\n\n<hr class=\"wp-block-separator\"\/>\n\n<h2 class=\"wp-block-heading\" id=\"h-cybersecurity-for-business-specialization\"><a href=\"https:\/\/imp.i384100.net\/c\/3308140\/1164545\/14726?u=https%3A%2F%2Fwww.coursera.org%2Fspecializations%2Fcyber-security-business\" target=\"_blank\" rel=\"noreferrer noopener\">\u4e1a\u52a1\u4e13\u4e1a\u5316\u7f51\u7edc\u5b89\u5168<\/a><\/h2>\n\n<p>\u672c\u8bfe\u7a0b\u662f\u4e3a\u90a3\u4e9b\u60f3\u8981\u4e86\u89e3\u5982\u4f55\u4fdd\u62a4\u8ba1\u7b97\u673a\u7cfb\u7edf\u548c\u8d44\u4ea7\u514d\u53d7\u653b\u51fb\u8005\u548c\u5176\u4ed6\u5a01\u80c1\u7684\u4eba\u51c6\u5907\u7684\u3002 \u8fd9\u4e5f\u662f\u4e3a\u90a3\u4e9b\u8c01\u60f3\u8981\u4e86\u89e3\u5982\u4f55\u8fdb\u884c\u5a01\u80c1\u548c\u653b\u51fb\uff0c\u4ee5\u66f4\u597d\u5730\u4fdd\u536b\u4ed6\u4eec\u7684\u7cfb\u7edf\u3002 \u8fd9\u79cd\u4e13\u4e1a\u5316\u4e13\u4e3a\u9ad8\u7ea7\u4e1a\u52a1\u9886\u5bfc\u8005\u3001\u4e2d\u5c42\u7ba1\u7406\u4eba\u5458\u548c\u7cfb\u7edf\u7ba1\u7406\u5458\u8bbe\u8ba1\uff0c\u56e0\u6b64\u4ed6\u4eec\u90fd\u80fd\u8bf4\u540c\u4e00\u79cd\u8bed\u8a00\uff0c\u5e76\u66f4\u597d\u5730\u5904\u7406\u7ec4\u7ec7\u7684\u5b89\u5168\u6027\u3002 \u6b64\u5916\uff0c\u8bfe\u7a0b\u6750\u6599\u53ef\u4ee5\u5e2e\u52a9\u60a8\u901a\u8fc7\u4e00\u4e9b\u884c\u4e1a\u9886\u5148\u7684\u8ba1\u7b97\u673a\u5b89\u5168\u8003\u8bd5\uff0c\u5982\u5b89\u5168+\u548c CISSP\u3002<\/p>\n\n<h3 class=\"wp-block-heading\" id=\"h-skills-you-will-gain-5\">\u60a8\u5c06\u83b7\u5f97\u7684\u6280\u80fd\uff1a<\/h3>\n\n<ul class=\"wp-block-list\"><li>\u7f51\u7edc\u5b89\u5168<\/li><li>\u9053\u5fb7\u9ed1\u5ba2\u539f\u5219\u548c\u7b56\u7565<\/li><li>\u4fe1\u606f\u5b89\u5168<\/li><li>\u98ce\u9669\u8bc4\u4f30<\/li><li>\u653b\u51fb\u8868\u9762<\/li><\/ul>\n\n<h3 class=\"wp-block-heading\" id=\"h-below-are-the-main-courses-1\"><strong>\u4ee5\u4e0b\u662f\u4e3b\u8981\u8bfe\u7a0b<\/strong>\uff1a<\/h3>\n\n<ul class=\"wp-block-list\"><li>\u5546\u4e1a\u7f51\u7edc\u5b89\u5168\u7b80\u4ecb<\/li><li>\u7f51\u7edc\u5a01\u80c1\u548c\u653b\u51fb\u8f7d\u4f53<\/li><li>\u68c0\u6d4b\u548c\u7f13\u89e3\u7f51\u7edc\u5a01\u80c1\u548c\u653b\u51fb<\/li><li>\u4e3b\u52a8\u8ba1\u7b97\u673a\u5b89\u5168<\/li><\/ul>\n\n<div class=\"wp-block-buttons is-horizontal is-content-justification-center is-layout-flex wp-container-core-buttons-is-layout-499968f5 wp-block-buttons-is-layout-flex\">\n<div class=\"wp-block-button\"><a class=\"wp-block-button__link\" href=\"https:\/\/imp.i384100.net\/c\/3308140\/1164545\/14726?u=https%3A%2F%2Fwww.coursera.org%2Fspecializations%2Fcyber-security-business\" target=\"_blank\" rel=\"noreferrer noopener\">\u73b0\u5728\u6ce8\u518c<\/a><\/div>\n<\/div>\n\n<hr class=\"wp-block-separator\"\/>\n\n<h2 class=\"wp-block-heading\" id=\"h-introduction-to-cyber-attacks\"><a href=\"https:\/\/imp.i384100.net\/c\/3308140\/1164545\/14726?u=https%3A%2F%2Fwww.coursera.org%2Flearn%2Fintro-cyber-attacks\" target=\"_blank\" rel=\"noreferrer noopener\">\u7f51\u7edc\u653b\u51fb\u7b80\u4ecb<\/a><\/h2>\n\n<p>\u672c\u8bfe\u7a0b\u4e3a\u5b66\u5458\u63d0\u4f9b\u4e86\u5bf9\u5e38\u89c1\u7f51\u7edc\u5b89\u5168\u5a01\u80c1\u3001\u6f0f\u6d1e\u548c\u98ce\u9669\u7684\u57fa\u7ebf\u7406\u89e3\u3002 \u8fd8\u5305\u62ec\u5982\u4f55\u6784\u5efa\u548c\u5e94\u7528\u5230\u771f\u5b9e\u7cfb\u7edf\u7684\u57fa\u672c\u7f51\u7edc\u653b\u51fb\u6982\u8ff0\u3002 \u793a\u4f8b\u5305\u62ec\u7b80\u5355\u7684 Unix \u5185\u6838\u9ed1\u5ba2\u3001\u4e92\u8054\u7f51\u8815\u866b\u548c\u8f6f\u4ef6\u5b9e\u7528\u7a0b\u5e8f\u4e2d\u7684\u7279\u6d1b\u4f0a\u6728\u9a6c\u3002 \u7f51\u7edc\u653b\u51fb\uff0c\u5982\u5206\u5e03\u5f0f\u62d2\u7edd\u670d\u52a1 \uff08DDOS\uff09 \u548c\u50f5\u5c38\u7f51\u7edc\u653b\u51fb\uff0c\u4e5f\u4f7f\u7528\u8fc7\u53bb\u51e0\u5341\u5e74\u7684\u771f\u5b9e\u4f8b\u5b50\u8fdb\u884c\u63cf\u8ff0\u548c\u8bf4\u660e\u3002<\/p>\n\n<p>\u5728\u6b64\u8fc7\u7a0b\u4e2d\uff0c\u6982\u8ff0\u4e86\u719f\u6089\u7684\u5206\u6790\u6a21\u578b\uff0c\u4f8b\u5982\u4fdd\u5bc6\/\u5b8c\u6574\u6027\/\u53ef\u7528\u6027 \uff08CIA\uff09 \u5b89\u5168\u5a01\u80c1\u6846\u67b6\u3002 \u4f8b\u5982\uff0c\u8fd9\u4e9b\u4e0d\u540c\u7c7b\u578b\u7684\u5a01\u80c1\u5982\u4f55\u964d\u4f4e\u5b9e\u9645\u8d44\u4ea7\u3002 \u8bfe\u7a0b\u8fd8\u5305\u62ec\u57fa\u672c\u7f51\u7edc\u5b89\u5168\u98ce\u9669\u5206\u6790\u7684\u4ecb\u7ecd\uff0c\u6982\u8ff0\u5a01\u80c1\u8d44\u4ea7\u77e9\u9635\u5982\u4f55\u786e\u5b9a\u98ce\u9669\u51b3\u7b56\u7684\u4f18\u5148\u7ea7\u3002 \u5a01\u80c1\u3001\u6f0f\u6d1e\u548c\u653b\u51fb\u5728\u7cfb\u7edf\u5b89\u5168\u5de5\u7a0b\u65b9\u6cd5\u7684\u80cc\u666f\u4e0b\u8fdb\u884c\u68c0\u67e5\u548c\u6620\u5c04\u3002<\/p>\n\n<h3 class=\"wp-block-heading\" id=\"h-skills-you-will-gain-6\">\u60a8\u5c06\u83b7\u5f97\u7684\u6280\u80fd\uff1a<\/h3>\n\n<ul class=\"wp-block-list\"><li>\u7f51\u7edc\u5b89\u5168<\/li><li>\u4fe1\u606f\u5b89\u5168<\/li><li>\u62d2\u7edd\u670d\u52a1\u653b\u51fb\uff08DOS\uff09<\/li><li>\u98ce\u9669\u8bc4\u4f30<\/li><li>\u9053\u5fb7\u9ed1\u5ba2\u539f\u5219\u548c\u7b56\u7565<\/li><\/ul>\n\n<h3 class=\"wp-block-heading\" id=\"h-syllabus-what-you-will-learn-from-this-course-2\"><strong>\u6559\u5b66\u5927\u7eb2 &#8211; \u60a8\u5c06\u4ece\u672c\u8bfe\u7a0b\u4e2d\u5b66\u5230\u4ec0\u4e48<\/strong><\/h3>\n\n<ul class=\"wp-block-list\"><li>\u7f51\u7edc\u5b89\u5168\u7b80\u4ecb<\/li><li>\u4e86\u89e3\u57fa\u672c\u5b89\u5168\u6846\u67b6<\/li><li>\u66f4\u4ed4\u7ec6\u5730\u68c0\u67e5\u7f51\u7edc\u5a01\u80c1<\/li><li>\u5f15\u5165\u5b89\u5168\u98ce\u9669\u5206\u6790<\/li><\/ul>\n\n<div class=\"wp-block-buttons is-horizontal is-content-justification-center is-layout-flex wp-container-core-buttons-is-layout-499968f5 wp-block-buttons-is-layout-flex\">\n<div class=\"wp-block-button\"><a class=\"wp-block-button__link\" href=\"https:\/\/imp.i384100.net\/c\/3308140\/1164545\/14726?u=https%3A%2F%2Fwww.coursera.org%2Flearn%2Fintro-cyber-attacks\" target=\"_blank\" rel=\"noreferrer noopener\">\u73b0\u5728\u6ce8\u518c<\/a><\/div>\n<\/div>\n\n<hr class=\"wp-block-separator\"\/>\n\n<h2 class=\"wp-block-heading\" id=\"h-ibm-cybersecurity-analyst\"><a href=\"https:\/\/imp.i384100.net\/c\/3308140\/1164545\/14726?u=https%3A%2F%2Fwww.coursera.org%2Fprofessional-certificates%2Fibm-cybersecurity-analyst\" target=\"_blank\" rel=\"noreferrer noopener\">IBM \u7f51\u7edc\u5b89\u5168\u5206\u6790\u5e08<\/a><\/h2>\n\n<ul class=\"wp-block-list\"><li>IBM \u63d0\u4f9b\u7684\u7f51\u7edc\u5b89\u5168\u8bfe\u7a0b\u5c06\u57f9\u517b\u60a8\u7684\u7f51\u7edc\u5b89\u5168\u5206\u6790\u6280\u80fd\u3001\u9053\u5fb7\u9ed1\u5ba2\u6280\u80fd\uff0c\u5305\u62ec\u6570\u636e\u4fdd\u62a4\u3001\u7aef\u70b9\u4fdd\u62a4;\u66b9\u7f57;\u4ee5\u53ca\u7cfb\u7edf\u548c\u7f51\u7edc\u57fa\u672c\u9762\u3002 \u5b66\u5458\u5c06\u4e86\u89e3\u5f53\u4eca\u7f51\u7edc\u5b89\u5168\u73af\u5883\u4e2d\u91cd\u8981\u7684\u5173\u952e\u5408\u89c4\u6027\u548c\u5a01\u80c1\u60c5\u62a5\u4e3b\u9898\u3002<\/li><li>\u901a\u8fc7\u5b9e\u9645\u7f51\u7edc\u5b89\u5168\u6848\u4f8b\u7814\u7a76\u83b7\u5f97\u4e8b\u4ef6\u54cd\u5e94\u548c\u53d6\u8bc1\u6280\u80fd\u3002<\/li><li>\u83b7\u5f97\u5b9e\u8df5\u7ecf\u9a8c\uff0c\u901a\u8fc7\u884c\u4e1a\u7279\u5b9a\u548c\u5f00\u6e90\u5b89\u5168\u5de5\u5177\u5f00\u53d1\u6280\u80fd<\/li><\/ul>\n\n<h3 class=\"wp-block-heading\" id=\"h-available-job-positions\">\u53ef\u7528\u804c\u4f4d\uff1a<\/h3>\n\n<ul class=\"wp-block-list\"><li>\u4fe1\u606f\u5b89\u5168\u5206\u6790\u5e08<\/li><li>IT \u5b89\u5168\u5206\u6790\u5e08<\/li><li>\u5b89\u5168\u5206\u6790\u5e08<\/li><li>\u521d\u7ea7\u7f51\u7edc\u5b89\u5168\u5206\u6790\u5e08<\/li><li>\u4fe1\u606f\u5b89\u5168<\/li><li>IBM \u65b0\u9886<\/li><li><\/li><\/ul>\n\n<h3 class=\"wp-block-heading\"><strong>\u60a8\u5c06\u83b7\u5f97\u7684\u6280\u80fd<\/strong>\uff1a<\/h3>\n\n<ul class=\"wp-block-list\"><li>\u6076\u610f\u8f6f\u4ef6<\/li><li>\u9053\u5fb7\u9ed1\u5ba2\u539f\u5219\u548c\u7b56\u7565<\/li><li>\u7f51\u7edc\u653b\u51fb<\/li><li>\u6570\u636e\u5e93\u6f0f\u6d1e<\/li><li>\u7f51\u7edc\u5b89\u5168<\/li><li>Sql \u6ce8\u5c04<\/li><\/ul>\n\n<h3 class=\"wp-block-heading\" id=\"h-below-are-the-main-courses-2\"><strong>\n  <strong>\u4ee5\u4e0b\u662f\u4e3b\u8981\u8bfe\u7a0b<\/strong>\n<\/strong>\uff1a<\/h3>\n\n<ul class=\"wp-block-list\"><li>\u7f51\u7edc\u5b89\u5168\u5de5\u5177\u548c\u7f51\u7edc\u653b\u51fb\u7b80\u4ecb<\/li><li>\u7f51\u7edc\u5b89\u5168\u89d2\u8272\u3001\u6d41\u7a0b\u548c\u64cd\u4f5c\u7cfb\u7edf\u5b89\u5168\u6027<\/li><li>\u7f51\u7edc\u5b89\u5168\u5408\u89c4\u6846\u67b6\u4e0e\u7cfb\u7edf\u7ba1\u7406<\/li><li>\u7f51\u7edc\u5b89\u5168\u4e0e\u6570\u636e\u5e93\u6f0f\u6d1e<\/li><li>\u6e17\u900f\u6d4b\u8bd5\u3001\u4e8b\u4ef6\u54cd\u5e94\u548c\u53d6\u8bc1<\/li><li>\u7f51\u7edc\u5a01\u80c1\u60c5\u62a5<\/li><li>\u7f51\u7edc\u5b89\u5168\u9876\u77f3\uff1a\u8fdd\u89c4\u54cd\u5e94\u6848\u4f8b\u7814\u7a76<\/li><li>IBM \u7f51\u7edc\u5b89\u5168\u5206\u6790\u5e08\u8bc4\u4f30<\/li><\/ul>\n\n<div class=\"wp-block-buttons is-horizontal is-content-justification-center is-layout-flex wp-container-core-buttons-is-layout-499968f5 wp-block-buttons-is-layout-flex\">\n<div class=\"wp-block-button\"><a class=\"wp-block-button__link\" href=\"https:\/\/imp.i384100.net\/c\/3308140\/1164545\/14726?u=https%3A%2F%2Fwww.coursera.org%2Fprofessional-certificates%2Fibm-cybersecurity-analyst\" target=\"_blank\" rel=\"noreferrer noopener\">\u73b0\u5728\u6ce8\u518c<\/a><\/div>\n<\/div>\n\n<hr class=\"wp-block-separator\"\/>\n\n<h2 class=\"wp-block-heading\" id=\"h-innovative-finance-hacking-finance-to-change-the-world\"><a href=\"https:\/\/imp.i384100.net\/c\/3308140\/1164545\/14726?u=https%3A%2F%2Fwww.coursera.org%2Flearn%2Finnovative-finance\" target=\"_blank\" rel=\"noreferrer noopener\">\u521b\u65b0\u91d1\u878d\uff1a\u9ed1\u5ba2\u91d1\u878d\u6539\u53d8\u4e16\u754c<\/a><\/h2>\n\n<p>\u5982\u679c\u5e94\u7528\u5f97\u5f53\uff0c\u91d1\u878d\u5de5\u5177\u53ef\u4ee5\u4fc3\u8fdb\u793e\u4f1a\u548c\u73af\u5883\u6210\u679c\u3002 \u672c\u8bfe\u7a0b\u65e8\u5728\u8ba9\u60a8\u80fd\u591f\u6784\u5efa\u521b\u65b0\u7684\u878d\u8d44\u6218\u7565\uff0c\u4ee5\u5b9e\u73b0\u8d22\u52a1\u5305\u5bb9\u3001\u83b7\u5f97\u80fd\u6e90\u548c\u83b7\u5f97\u6559\u80b2\u7b49\u6210\u679c\u3002 \u521b\u65b0\u878d\u8d44\u6d41\u7a0b\u6709\u4e94\u4e2a\u5173\u952e\u7ec4\u6210\u90e8\u5206\u3002 \u5b83\u4ece\u786e\u5b9a\u60a8\u5e0c\u671b\u5b9e\u73b0\u7684\u7ed3\u679c\u5f00\u59cb\uff0c\u7136\u540e\u4f7f\u7528\u8bbe\u8ba1\u601d\u7ef4\u6280\u672f\u5728\u95ee\u9898\u9886\u57df\u8fdb\u884c\u5c3d\u804c\u8c03\u67e5\uff0c\u4ee5\u786e\u4fdd\u60a8\u6b63\u5728\u4e0e\u6700\u7ec8\u7528\u6237\u4e00\u8d77\u8bbe\u8ba1\u3002 \u63a5\u4e0b\u6765\uff0c\u60a8\u5fc5\u987b\u6620\u5c04\u53ef\u7528\u4e8e\u60a8\u7ed3\u679c\u7684\u6240\u6709\u8d44\u6e90\uff0c\u7136\u540e\u53d1\u73b0\u901a\u8fc7\u5546\u4e1a\u6a21\u5f0f\u521b\u65b0\u6765\u589e\u5f3a\u8fd9\u4e9b\u8d44\u6e90\u7684\u673a\u4f1a\u3002 \u6700\u540e\uff0c\u672c\u8bfe\u7a0b\u5c06\u5e2e\u52a9\u60a8\u5c06\u6240\u6709\u8fd9\u4e9b\u90e8\u5206\u653e\u5728\u4e00\u8d77\uff0c\u8bbe\u8ba1\u521b\u65b0\u7684\u878d\u8d44\u7b56\u7565\uff0c\u540c\u65f6\u901a\u8fc7\u9053\u5fb7\u9ed1\u5ba2\u6700\u4f73\u5b9e\u8df5\u786e\u4fdd\u60a8\u7684\u5e73\u53f0\u5b89\u5168\u3002<\/p>\n\n<h3 class=\"wp-block-heading\" id=\"h-syllabus-what-you-will-learn-from-this-course-3\"><strong>\u6559\u5b66\u5927\u7eb2\uff1a\u60a8\u5c06\u4ece\u672c\u8bfe\u7a0b\u4e2d\u5b66\u5230\u4ec0\u4e48<\/strong><strong><\/strong><\/h3>\n\n<ul class=\"wp-block-list\"><li>\u9009\u62e9\u60a8\u7684\u95ee\u9898\u533a\u57df<\/li><li>\u4e86\u89e3\u6311\u6218\u548c\u969c\u788d<\/li><li>\u8bc6\u522b\u8d44\u6e90<\/li><li>\u53d1\u73b0\u673a\u4f1a<\/li><li>\u5f71\u54cd\u8bbe\u8ba1<\/li><li>\u5b9e\u65bd\u9053\u5fb7\u9ed1\u5ba2\u539f\u5219\u548c\u6218\u7565<\/li><\/ul>\n\n<div class=\"wp-block-buttons is-horizontal is-content-justification-center is-layout-flex wp-container-core-buttons-is-layout-499968f5 wp-block-buttons-is-layout-flex\">\n<div class=\"wp-block-button\"><a class=\"wp-block-button__link\" href=\"https:\/\/imp.i384100.net\/c\/3308140\/1164545\/14726?u=https%3A%2F%2Fwww.coursera.org%2Flearn%2Finnovative-finance\" target=\"_blank\" rel=\"noreferrer noopener\">\u73b0\u5728\u6ce8\u518c<\/a><\/div>\n<\/div>\n\n<hr class=\"wp-block-separator\"\/>\n\n<h2 class=\"wp-block-heading\" id=\"h-introduction-to-cybersecurity-tools-cyber-attacks\"><a href=\"https:\/\/imp.i384100.net\/c\/3308140\/1164545\/14726?u=https%3A%2F%2Fwww.coursera.org%2Flearn%2Fintroduction-cybersecurity-cyber-attacks\" target=\"_blank\" rel=\"noreferrer noopener\">\u7f51\u7edc\u5b89\u5168\u5de5\u5177\u4e0e\u7f51\u7edc\u653b\u51fb\u7b80\u4ecb<\/a><\/h2>\n\n<p>\u672c\u8bfe\u7a0b\u4e3a\u60a8\u63d0\u4f9b\u4e86\u4e86\u89e3\u57fa\u672c\u7f51\u7edc\u5b89\u5168\u6240\u9700\u7684\u80cc\u666f\u3002 \u60a8\u5c06\u4e86\u89e3\u7f51\u7edc\u5b89\u5168\u7684\u5386\u53f2\u3001\u7c7b\u578b\u548c\u7f51\u7edc\u653b\u51fb\u7684\u52a8\u673a\uff0c\u4ee5\u4fbf\u901a\u8fc7\u90e8\u7f72\u9053\u5fb7\u6700\u4f73\u5b9e\u8df5\uff0c\u8fdb\u4e00\u6b65\u4e86\u89e3\u5f53\u524d\u5bf9\u7ec4\u7ec7\u548c\u4e2a\u4eba\u7684\u5a01\u80c1\u4ee5\u53ca\u9884\u9632\u3002 \u5c06\u5ba1\u67e5\u5173\u952e\u672f\u8bed\u3001\u57fa\u672c\u7cfb\u7edf\u6982\u5ff5\u548c\u5de5\u5177\uff0c\u4ee5\u5f15\u5165\u7f51\u7edc\u5b89\u5168\u9886\u57df\u3002<\/p>\n\n<p>\u60a8\u5c06\u4e86\u89e3\u6279\u5224\u6027\u601d\u7ef4\u53ca\u5176\u5bf9\u4efb\u4f55\u5e0c\u671b\u4ece\u4e8b\u7f51\u7edc\u5b89\u5168\u4e8b\u4e1a\u7684\u4eba\u7684\u91cd\u8981\u6027\u3002 \u6700\u540e\uff0c\u60a8\u5c06\u5f00\u59cb\u4e86\u89e3\u7ec4\u7ec7\u548c\u8d44\u6e90\uff0c\u4ee5\u8fdb\u4e00\u6b65\u7814\u7a76\u73b0\u4ee3\u7684\u7f51\u7edc\u5b89\u5168\u95ee\u9898\u3002<\/p>\n\n<h3 class=\"wp-block-heading\" id=\"h-what-you-will-learn-2\">\u60a8\u5c06\u5b66\u5230\u4ec0\u4e48\uff1a<\/h3>\n\n<ul class=\"wp-block-list\"><li>\u57fa\u4e8e\u5386\u53f2\u4e8b\u4ef6\u7684\u5b89\u5168\u6f14\u53d8\u3002<\/li><li>\u5217\u51fa\u5404\u79cd\u7c7b\u578b\u7684\u6076\u610f\u8f6f\u4ef6\u3002<\/li><li>\u63cf\u8ff0\u5173\u952e\u7684\u7f51\u7edc\u5b89\u5168\u6982\u5ff5\uff0c\u5305\u62ec\u4e2d\u60c5\u5c40\u4e09\u5408\u4f1a\u3001\u8bbf\u95ee\u7ba1\u7406\u3001\u4e8b\u4ef6\u54cd\u5e94\u548c\u5e38\u89c1\u7684\u7f51\u7edc\u5b89\u5168\u6700\u4f73\u5b9e\u8df5\u3002<\/li><li>\u8bc6\u522b\u5173\u952e\u7684\u7f51\u7edc\u5b89\u5168\u5de5\u5177\u3001\u9053\u5fb7\u9ed1\u5ba2\u539f\u5219\u548c\u7b56\u7565\uff0c\u5305\u62ec\u4ee5\u4e0b\u5185\u5bb9\uff1a\u9632\u706b\u5899\u3001\u9632\u75c5\u6bd2\u3001\u52a0\u5bc6\u3001\u6e17\u900f\u6d4b\u8bd5\u548c\u6570\u5b57\u53d6\u8bc1\u3002<\/li><\/ul>\n\n<h3 class=\"wp-block-heading\" id=\"h-skills-you-will-gain-7\"><strong>\u60a8\u5c06\u83b7\u5f97\u7684\u6280\u80fd<\/strong>\uff1a<\/h3>\n\n<ul class=\"wp-block-list\"><li>\u4fe1\u606f\u5b89\u5168<\/li><li>IBM \u65b0\u9886<\/li><li>\u6076\u610f\u8f6f\u4ef6<\/li><li>\u7f51\u7edc\u5b89\u5168<\/li><li>\u7f51\u7edc\u653b\u51fb<\/li><li>\u9053\u5fb7\u9ed1\u5ba2\u6280\u80fd<\/li><\/ul>\n\n<h3 class=\"wp-block-heading\" id=\"h-syllabus-what-you-will-learn-from-this-course-4\"><strong>\u6559\u5b66\u5927\u7eb2\uff1a\u60a8\u5c06\u4ece\u672c\u8bfe\u7a0b\u4e2d\u5b66\u5230\u4ec0\u4e48<\/strong><\/h3>\n\n<ul class=\"wp-block-list\"><li>\u7f51\u7edc\u5b89\u5168\u53f2<\/li><li>\u6f14\u5458\u7c7b\u578b\u53ca\u5176\u52a8\u673a\u7684\u7b80\u8981\u6982\u8ff0<\/li><li>\u5173\u952e\u5b89\u5168\u6982\u5ff5\u6982\u8ff0<\/li><li>\u5173\u952e\u5b89\u5168\u5de5\u5177\u6982\u8ff0<\/li><\/ul>\n\n<div class=\"wp-block-buttons is-horizontal is-content-justification-center is-layout-flex wp-container-core-buttons-is-layout-499968f5 wp-block-buttons-is-layout-flex\">\n<div class=\"wp-block-button\"><a class=\"wp-block-button__link\" href=\"https:\/\/imp.i384100.net\/c\/3308140\/1164545\/14726?u=https%3A%2F%2Fwww.coursera.org%2Flearn%2Fintroduction-cybersecurity-cyber-attacks\" target=\"_blank\" rel=\"noreferrer noopener\">\u73b0\u5728\u6ce8\u518c<\/a><\/div>\n<\/div>\n\n<hr class=\"wp-block-separator\"\/>\n\n<h2 class=\"wp-block-heading\" id=\"h-hacking-exercise-for-health\"><a href=\"https:\/\/imp.i384100.net\/c\/3308140\/1164545\/14726?u=https%3A%2F%2Fwww.coursera.org%2Flearn%2Fhacking-exercise-health\" target=\"_blank\" rel=\"noreferrer noopener\">\u9ed1\u5ba2\u5065\u5eb7\u8fd0\u52a8<\/a><\/h2>\n\n<p>\u4f60\u53ef\u80fd\u60f3\u77e5\u9053\u4ec0\u4e48\u9053\u5fb7\u9ed1\u5ba2\u4e0e\u953b\u70bc\u7684\u6574\u4f53\u5065\u5eb7\u3002 \u672c\u8bfe\u7a0b\u5c06\u5411\u60a8\u4ecb\u7ecd\u4ee5\u4e0b\u51e0\u70b9\uff1a<\/p>\n\n<ul class=\"wp-block-list\"><li>\u5982\u4f55\u8bc4\u4f30\u4f53\u80b2\u6d3b\u52a8\u5bf9\u5065\u5eb7\u7684\u4f5c\u7528<\/li><li>\u901a\u8fc7\u6709\u6c27\u8bad\u7ec3\u63d0\u9ad8\u60a8\u7684\u5fc3\u80ba\u5065\u8eab\u80fd\u529b<\/li><li>\u529b\u91cf\u8bad\u7ec3\u5982\u4f55\u63d0\u9ad8\u529b\u91cf\u548c\u6539\u5584\u5065\u5eb7<\/li><li>\u5236\u5b9a\u81ea\u5df1\u7684\u5fc3\u80ba\u548c\u808c\u8089\u9aa8\u9abc\u8fd0\u52a8\u7a0b\u5e8f\uff0c\u4ee5\u6539\u5584\u60a8\u7684\u5065\u5eb7<\/li><\/ul>\n\n<h3 class=\"wp-block-heading\" id=\"h-skills-you-will-gain-8\"><strong><strong>\u60a8\u5c06\u83b7\u5f97\u7684\u6280\u80fd<\/strong>\uff1a<\/strong><\/h3>\n\n<ul class=\"wp-block-list\"><li>\u5065\u5eb7<\/li><li>\u5fc3 \u80ba<\/li><li>\u953b\u70bc<\/li><li>\u808c\u8089 \u9aa8\u9abc<\/li><li>\u8425\u517b<\/li><\/ul>\n\n<h3 class=\"wp-block-heading\" id=\"h-syllabus-what-you-will-learn-from-this-course-5\"><strong>\u6559\u5b66\u5927\u7eb2 &#8211; \u60a8\u5c06\u4ece\u672c\u8bfe\u7a0b\u4e2d\u5b66\u5230\u4ec0\u4e48<\/strong><\/h3>\n\n<ul class=\"wp-block-list\"><li>\u5065\u8eab\u57fa\u7840\u77e5\u8bc6<\/li><li>\u5fc3\u80ba\u5065\u8eab<\/li><li>\u808c\u8089\u9aa8\u9abc\u5065\u8eab<\/li><li>\u7ed3\u5408\u5fc3\u810f\u548c\u529b\u91cf\u5065\u8eab<\/li><\/ul>\n\n<div class=\"wp-block-buttons is-horizontal is-content-justification-center is-layout-flex wp-container-core-buttons-is-layout-499968f5 wp-block-buttons-is-layout-flex\">\n<div class=\"wp-block-button\"><a class=\"wp-block-button__link\" href=\"https:\/\/imp.i384100.net\/c\/3308140\/1164545\/14726?u=https%3A%2F%2Fwww.coursera.org%2Flearn%2Fhacking-exercise-health\" target=\"_blank\" rel=\"noreferrer noopener\">\u73b0\u5728\u6ce8\u518c<\/a><\/div>\n<\/div>\n\n<hr class=\"wp-block-separator\"\/>\n\n<h2 class=\"wp-block-heading\" id=\"h-cyber-incidents-response\"><a href=\"https:\/\/imp.i384100.net\/c\/3308140\/1164545\/14726?u=https%3A%2F%2Fwww.coursera.org%2Flearn%2Fincident-response\" target=\"_blank\" rel=\"noreferrer noopener\">\u7f51\u7edc\u4e8b\u4ef6\u54cd\u5e94<\/a><\/h2>\n\n<p>\u7f51\u7edc\u4e8b\u4ef6\u54cd\u5e94\u8bfe\u7a0b\u5c06\u8ba9\u5b66\u751f\u4e86\u89e3\u5982\u4f55\u5728\u9ad8\u7ea7\u522b\u4e0a\u5e94\u5bf9\u4e8b\u4ef6\uff0c\u5e76\u901a\u8fc7\u6a21\u62df\u548c\u5b9e\u8df5\u5b9e\u9a8c\u5ba4\u9879\u76ee\u90e8\u7f72\u9053\u5fb7\u9ed1\u5ba2\u6280\u80fd\u3002<\/p>\n\n<p>\u672c\u8bfe\u7a0b\u9996\u5148\u5bf9\u5e94\u5bf9\u4e8b\u4ef6\u7684\u6bcf\u4e2a\u9636\u6bb5\u4f1a\u53d1\u751f\u4ec0\u4e48\u8fdb\u884c\u9ad8\u7ea7\u522b\u8ba8\u8bba\uff0c\u7136\u540e\u5bf9\u8bb0\u5fc6\u3001\u7f51\u7edc\u3001\u4e3b\u673a\u5206\u6790\u548c\u53d6\u8bc1\u7b49\u4e00\u4e9b\u66f4\u4ee4\u4eba\u5174\u594b\u7684\u90e8\u5206\u8fdb\u884c\u6280\u672f\u6df1\u5165\u63a2\u8ba8\u3002 \u672c\u8bfe\u7a0b\u9002\u7528\u4e8e\u4efb\u4f55\u5e0c\u671b\u5c06\u5b66\u5230\u7684\u6cd5\u533b\u548c\u5192\u72af\u6027\u77e5\u8bc6\uff08\u5982\u9053\u5fb7\u9ed1\u5ba2\uff09\u5e94\u7528\u4e8e\u4e8b\u4ef6\u54cd\u5e94\u8fc7\u7a0b\u7684\u4eba\u3002<\/p>\n\n<h3 class=\"wp-block-heading\" id=\"h-skills-you-will-gain-9\">\u60a8\u5c06\u83b7\u5f97\u7684\u6280\u80fd\uff1a<\/h3>\n\n<ul class=\"wp-block-list\"><li>\u8ba1\u7b97\u673a\u5b89\u5168\u4e8b\u4ef6\u7ba1\u7406<\/li><li>\u6076\u610f\u8f6f\u4ef6\u5206\u6790<\/li><li>\u8bb0\u5fc6\u53d6\u8bc1<\/li><li>\u9053\u5fb7\u9ed1\u5ba2\u539f\u5219\u548c\u7b56\u7565<\/li><li>\u6d41\u91cf\u5206\u6790<\/li><\/ul>\n\n<h3 class=\"wp-block-heading\" id=\"h-syllabus-what-you-will-learn-from-this-course-6\"><strong>\u6559\u5b66\u5927\u7eb2 &#8211; \u60a8\u5c06\u4ece\u672c\u8bfe\u7a0b\u4e2d\u5b66\u5230\u4ec0\u4e48<\/strong><\/h3>\n\n<ul class=\"wp-block-list\"><li>\u4e8b\u4ef6\u54cd\u5e94\u57fa\u672c\u539f\u7406<\/li><li>\u4e8b\u4ef6\u54cd\u5e94\u9636\u6bb5<\/li><li>\u5e26\u4e8b\u4ef6\u54cd\u5e94\u5de5\u5177\u7684\u6280\u672f\u6df1\u5ea6\u6f5c\u6c34<\/li><\/ul>\n\n<div class=\"wp-block-buttons is-horizontal is-content-justification-center is-layout-flex wp-container-core-buttons-is-layout-499968f5 wp-block-buttons-is-layout-flex\">\n<div class=\"wp-block-button\"><a class=\"wp-block-button__link\" href=\"https:\/\/imp.i384100.net\/c\/3308140\/1164545\/14726?u=https%3A%2F%2Fwww.coursera.org%2Flearn%2Fincident-response\" target=\"_blank\" rel=\"noreferrer noopener\">\u73b0\u5728\u6ce8\u518c<\/a><\/div>\n<\/div>\n\n<hr class=\"wp-block-separator\"\/>\n\n<h2 class=\"wp-block-heading\" id=\"h-cyber-threats-attack-vectors\"><a href=\"https:\/\/imp.i384100.net\/c\/3308140\/1164545\/14726?u=https%3A%2F%2Fwww.coursera.org%2Flearn%2Fcyber-threats-attack-vectors\" target=\"_blank\" rel=\"noreferrer noopener\">\u7f51\u7edc\u5a01\u80c1\u653b\u51fb\u8f7d\u4f53<\/a><\/h2>\n\n<p>\u6570\u636e\u6cc4\u9732\u51e0\u4e4e\u6bcf\u5929\u90fd\u4f1a\u53d1\u751f\u3002 \u4ece\u975e\u5e38\u5927\u7684\u96f6\u552e\u5546\u5230\u60a8\u7684\u65e5\u5e38\u5a31\u4e50\u7f51\u7ad9\u3002 \u4ee5\u8fd9\u6837\u6216\u90a3\u6837\u7684\u65b9\u5f0f\u6570\u636e\u5df2\u88ab\u6cc4\u9732\uff0c\u8fd9\u8981\u6c42\u9053\u5fb7\u9ed1\u5ba2\uff0c\u4ee5\u9632\u6b62\u6b64\u7c7b\u4e8b\u4ef6\u53d1\u751f\u3002 \u672c\u8bfe\u7a0b\u662f\u5b9e\u7528\u8ba1\u7b97\u673a\u5b89\u5168\u7684\u7b2c\u4e8c\u95e8\u8bfe\u7a0b\u3002 \u5b83\u5c06\u8ba8\u8bba\u5f53\u4eca\u73af\u5883\u4e2d\u5e38\u89c1\u7684\u5a01\u80c1\u548c\u653b\u51fb\u8f7d\u4f53\u7c7b\u578b\u3002 \u6211\u4e0d\u60f3\u6210\u4e3a\u574f\u6d88\u606f\u7684\u643a\u5e26\u8005\uff0c \u4f46\u5a01\u80c1\u904d\u5e03\u5404\u5730\uff01 \u672c\u8bfe\u7a0b\u7684\u76ee\u7684\u4e0d\u662f\u8981\u6d1e\u5bdf\u5bf9\u7cfb\u7edf\u548c\u4e1a\u52a1\u5b89\u5168\u6ca1\u6709\u5e0c\u671b\u7684\u6050\u60e7\uff0c\u800c\u662f\u8981\u6559\u80b2\u60a8\u5982\u4f55\u8fdb\u884c\u653b\u51fb\uff0c\u4ee5\u4fbf\u66f4\u597d\u5730\u4e86\u89e3\u5728\u4e1a\u52a1\u6216\u7cfb\u7edf\u4e2d\u9700\u8981\u6ce8\u610f\u7684\u5185\u5bb9\u3002<\/p>\n\n<h3 class=\"wp-block-heading\" id=\"h-syllabus-what-you-will-learn-from-this-course-7\"><strong>\u6559\u5b66\u5927\u7eb2 &#8211; \u60a8\u5c06\u4ece\u672c\u8bfe\u7a0b\u4e2d\u5b66\u5230\u4ec0\u4e48<\/strong><\/h3>\n\n<ul class=\"wp-block-list\"><li>\u8ba1\u7b97\u673a\u5b89\u5168\u4e2d\u7684\u5a01\u80c1\u548c\u653b\u51fb\u8f7d\u4f53<\/li><li>\u57fa\u4e8e\u7f51\u7edc\u548c\u7cfb\u7edf\u7684\u653b\u51fb<\/li><li>\u9053\u5fb7\u9ed1\u5ba2\u539f\u5219\u548c\u7b56\u7565<\/li><li>\u4e91\u5b89\u5168<\/li><li>\u5e38\u89c1\u6f0f\u6d1e<\/li><li>\u6570\u636e\u6cc4\u9732<\/li><\/ul>\n\n<div class=\"wp-block-buttons is-horizontal is-content-justification-center is-layout-flex wp-container-core-buttons-is-layout-499968f5 wp-block-buttons-is-layout-flex\">\n<div class=\"wp-block-button\"><a class=\"wp-block-button__link\" href=\"https:\/\/imp.i384100.net\/c\/3308140\/1164545\/14726?u=https%3A%2F%2Fwww.coursera.org%2Flearn%2Fcyber-threats-attack-vectors\" target=\"_blank\" rel=\"noreferrer noopener\">\u73b0\u5728\u6ce8\u518c<\/a><\/div>\n<\/div>\n\n<hr class=\"wp-block-separator\"\/>\n\n<h2 class=\"wp-block-heading\" id=\"h-privacy-law-and-data-protection\"><a href=\"https:\/\/imp.i384100.net\/c\/3308140\/1164545\/14726?u=https%3A%2F%2Fwww.coursera.org%2Flearn%2Fprivacy-law-data-protection\" target=\"_blank\" rel=\"noreferrer noopener\">\u9690\u79c1\u6cd5\u548c\u6570\u636e\u4fdd\u62a4<\/a><\/h2>\n\n<p>\u5728\u6b64\u8fc7\u7a0b\u4e2d\uff0c\u6211\u4eec\u5c06\u7814\u7a76\u5bfc\u822a\u9690\u79c1\u8981\u6c42\u590d\u6742\u666f\u89c2\u7684\u5b9e\u9645\u65b9\u9762\u3002 \u66f4\u597d\u5730\u4e86\u89e3\u9690\u79c1\u6cd5\u548c\u6570\u636e\u4fdd\u62a4\u5c06\u4f7f\u60a8\u80fd\u591f\u4fdd\u62a4\u60a8\u7684\u7ec4\u7ec7\u548c\u4f9d\u8d56\u60a8\u7684\u7ec4\u7ec7\u4fdd\u62a4\u5176\u4e2a\u4eba\u4fe1\u606f\u7684\u9009\u6c11\u3002 \u9996\u5148\uff0c\u6211\u4eec\u5c06\u7814\u7a76\u63a8\u52a8\u5236\u5b9a\u4fdd\u62a4\u4e2a\u4eba\u4fe1\u606f\u7684\u6cd5\u5f8b\u3001\u6700\u4f73\u505a\u6cd5\u548c\u5176\u4ed6\u6807\u51c6\u7684\u5386\u53f2\u80cc\u666f\u3002 \u6211\u4eec\u8fd8\u5c06\u8003\u8651\u7f8e\u56fd\u9690\u79c1\u6cd5\u4e2d\u5b58\u5728\u54ea\u4e9b\u9886\u57df\uff0c\u54ea\u4e9b\u90e8\u95e8\u4ecd\u7136\u4e0d\u53d7\u76d1\u7ba1\u3002 \u63a5\u4e0b\u6765\uff0c\u6211\u4eec\u5c06\u91cd\u70b9\u8ba8\u8bba\u8054\u90a6\u5065\u5eb7\u9690\u79c1\u6cd5\u30011996\u5e74\u300a\u5065\u5eb7\u4fdd\u9669\u53ef\u79fb\u690d\u6027\u548c\u8d23\u4efb\u6cd5\u6848\u300b\uff08HIPAA\uff09\u4ee5\u53ca\u9075\u5b88\u8be5\u6cd5\u6240\u9700\u7684\u5185\u5bb9\u3002 \u60a8\u5982\u4f55\u77e5\u9053\u8981\u6c42\u7684\u8303\u56f4\uff1f \u4e00\u65e6\u60a8\u77e5\u9053 HIPAA \u9002\u7528\uff0c\u60a8\u5982\u4f55\u91c7\u53d6\u63aa\u65bd\u786e\u4fdd\u5408\u89c4\uff1f<\/p>\n\n<h3 class=\"wp-block-heading\" id=\"h-what-you-will-learn-3\"><strong>\u60a8\u5c06\u5b66\u5230\u4ec0\u4e48\uff1a<\/strong><\/h3>\n\n<ul class=\"wp-block-list\"><li>\u4f7f\u7528\u516c\u5e73\u4fe1\u606f\u539f\u5219\u63d0\u4f9b\u4fdd\u62a4\u9690\u79c1\u7684\u65b9\u6cd5<\/li><li>\u786e\u5b9a\u4e0e\u6570\u636e\u4fdd\u62a4\u6709\u5173\u7684\u6cd5\u5f8b\u6cd5\u89c4<\/li><li>\u9002\u7528\u4e8e\u590d\u6742\u7ec4\u7ec7\u7684\u9690\u79c1\u4e49\u52a1<\/li><li>\u786e\u5b9a\u7ba1\u7406\u4e0e\u9690\u79c1\u6cd5\u548c\u6570\u636e\u4fdd\u62a4\u76f8\u5173\u7684\u5408\u89c4\u95ee\u9898\u7684\u7b56\u7565<\/li><\/ul>\n\n<h3 class=\"wp-block-heading\" id=\"h-skills-you-will-gain-10\">\u60a8\u5c06\u83b7\u5f97\u7684\u6280\u80fd\uff1a<\/h3>\n\n<ul class=\"wp-block-list\"><li>\u4fe1\u606f\u9690\u79c1<\/li><li>\u98ce\u9669\u7ba1\u7406<\/li><li>\u6570\u636e\u7ba1\u7406<\/li><li>\u9053\u5fb7\u9ed1\u5ba2\u539f\u5219<\/li><li>\u9690\u79c1\u5408\u89c4\u6027<\/li><\/ul>\n\n<h3 class=\"wp-block-heading\" id=\"h-syllabus-what-you-will-learn-from-this-course-8\"><strong>\u6559\u5b66\u5927\u7eb2 &#8211; \u60a8\u5c06\u4ece\u672c\u8bfe\u7a0b\u4e2d\u5b66\u5230\u4ec0\u4e48<\/strong><\/h3>\n\n<ul class=\"wp-block-list\"><li>\u9690\u79c1\uff1a\u6cd5\u5f8b\u95ee\u9898\u3001\u98ce\u666f\u548c\u5e74\u8868<\/li><li>\u5e0c\u5e15<\/li><li>\u5b89\u5168\u6027\u4e0e\u8fdd\u89c4\u901a\u77e5<\/li><li>\u9690\u79c1\u7ba1\u7406\u7684\u5176\u4ed6\u65b9\u5f0f<\/li><\/ul>\n\n<div class=\"wp-block-buttons is-horizontal is-content-justification-center is-layout-flex wp-container-core-buttons-is-layout-499968f5 wp-block-buttons-is-layout-flex\">\n<div class=\"wp-block-button\"><a class=\"wp-block-button__link\" href=\"https:\/\/imp.i384100.net\/c\/3308140\/1164545\/14726?u=https%3A%2F%2Fwww.coursera.org%2Flearn%2Fprivacy-law-data-protection\" target=\"_blank\" rel=\"noreferrer noopener\">\u73b0\u5728\u6ce8\u518c<\/a><\/div>\n<\/div>\n\n<hr class=\"wp-block-separator\"\/>\n\n<h2 class=\"wp-block-heading\" id=\"h-privacy-and-standardisation-specialization\"><a href=\"https:\/\/imp.i384100.net\/c\/3308140\/1164545\/14726?u=https%3A%2F%2Fwww.coursera.org%2Fspecializations%2Fprivacy\" target=\"_blank\" rel=\"noreferrer noopener\">\u9690\u79c1\u548c\u6807\u51c6\u5316\u4e13\u4e1a\u5316<\/a><\/h2>\n\n<p>\u9690\u79c1\u8bfe\u7a0b\u4e3a\u60a8\u63d0\u4f9b\u4e86\u5728\u56fd\u9645\u80cc\u666f\u4e0b\u9690\u79c1\u6743\u53d1\u5c55\u7684\u5386\u53f2\u89c6\u89d2\u3002 \u6807\u51c6\u5316\u8bfe\u7a0b\u5411\u60a8\u5c55\u793a\u4e86\u6807\u51c6\u5316\u7684\u6cd5\u5f8b\u80cc\u666f\u548c\u53ef\u6269\u5c55\u6027\u3002<\/p>\n\n<p>\u4e13\u4e1a\u5316\u5c06\u5e2e\u52a9\u60a8\u5efa\u7acb\u4e00\u4e2a\u5168\u9762\u7684\u610f\u89c1\uff0c\u5b83\u4f1a\u6311\u6218\u4f60\u5728\u5f53\u4eca\u9690\u79c1\u4fdd\u62a4\u7684\u6240\u6709\u9886\u57df\u3002 \u5b83\u5c06\u5c06\u5386\u53f2\u91cc\u7a0b\u7891\u4e0e\u5f53\u524d\u7684\u9650\u5236\u8054\u7cfb\u8d77\u6765\uff0c\u4e3a\u60a8\u63d0\u4f9b\u7a7f\u8d8a\u53f8\u6cd5\u7ba1\u8f96\u533a\u548c\u6280\u672f\u9886\u57df\u7684\u65c5\u7a0b\u3002<\/p>\n\n<h3 class=\"wp-block-heading\" id=\"h-what-you-will-learn-4\">\u60a8\u5c06\u5b66\u5230\u4ec0\u4e48\uff1a<\/h3>\n\n<ul class=\"wp-block-list\"><li>\u53d1\u73b0\u6807\u51c6\u7684\u5de8\u5927\u793e\u4f1a\u4f5c\u7528\uff0c\u91cd\u89c6\u826f\u597d\u9053\u5fb7\u9ed1\u5ba2\u6807\u51c6\u7684\u53d1\u5c55\u548c\u57fa\u672c\u539f\u7406<\/li><li>\u5c06\u9690\u79c1\u548c\u6570\u636e\u4fdd\u62a4\u4e0e\u4eba\u6743\u548c\u81ea\u7531\u8054\u7cfb\u8d77\u6765<\/li><li>\u6bd4\u8f83\u6b27\u7f8e\u9690\u79c1\u6cd5\u7684\u6cd5\u5f8b\u57fa\u672c\u539f\u7406\uff0c\u5206\u6790\u5176\u5dee\u5f02<\/li><li>\u53d1\u73b0\u6280\u672f\u8fdb\u6b65\u548c\u9690\u79c1\u4e4b\u95f4\u7684\u4e0d\u7a33\u5b9a\u5e73\u8861<\/li><li>\u5b66\u4e60\u9053\u5fb7\u9ed1\u5ba2\u539f\u5219\u548c\u7b56\u7565<\/li><\/ul>\n\n<h3 class=\"wp-block-heading\" id=\"h-below-are-the-main-courses-3\"><strong><strong>\u4ee5\u4e0b\u662f\u4e3b\u8981\u8bfe\u7a0b<\/strong>\uff1a<\/strong><\/h3>\n\n<ul class=\"wp-block-list\"><li>\u897f\u65b9\u4e16\u754c\u7684\u9690\u79c1<\/li><li>\u6807\u51c6\u5316\u4e0e\u6280\u672f<\/li><li>\u7f8e\u56fd\u7684\u9690\u79c1<\/li><li>\u6807\u51c6\u5316\u9876\u77f3<\/li><li>\u6b27\u6d32\u7684\u9690\u79c1<\/li><\/ul>\n\n<div class=\"wp-block-buttons is-horizontal is-content-justification-center is-layout-flex wp-container-core-buttons-is-layout-499968f5 wp-block-buttons-is-layout-flex\">\n<div class=\"wp-block-button\"><a class=\"wp-block-button__link\" href=\"https:\/\/imp.i384100.net\/c\/3308140\/1164545\/14726?u=https%3A%2F%2Fwww.coursera.org%2Fspecializations%2Fprivacy\" target=\"_blank\" rel=\"noreferrer noopener\">\u73b0\u5728\u6ce8\u518c<\/a><\/div>\n<\/div>\n\n<hr class=\"wp-block-separator\"\/>\n\n<h2 class=\"wp-block-heading\" id=\"h-data-privacy-fundamentals\"><a href=\"https:\/\/imp.i384100.net\/c\/3308140\/1164545\/14726?u=https%3A%2F%2Fwww.coursera.org%2Flearn%2Fnortheastern-data-privacy\" target=\"_blank\" rel=\"noreferrer noopener\">\u6570\u636e\u9690\u79c1\u57fa\u7840\u77e5\u8bc6<\/a><\/h2>\n\n<p>\u672c\u8bfe\u7a0b\u65e8\u5728\u5411\u5e7f\u5927\u53d7\u4f17\u4ecb\u7ecd\u6570\u636e\u9690\u79c1\uff0c\u5e76\u5e2e\u52a9\u6bcf\u4f4d\u53c2\u4e0e\u8005\u4e86\u89e3\u6570\u636e\u9690\u79c1\u548c\u7f51\u7edc\u5b89\u5168\u5982\u4f55\u6f14\u53d8\u4e3a\u516c\u4f17\u548c\u79c1\u4eba\u7ec4\u7ec7\u548c\u4e2a\u4eba\u7684\u8feb\u5207\u5173\u6ce8\u70b9\u3002 \u60a8\u5c06\u542c\u5230\u6cd5\u5f8b\u548c\u6280\u672f\u4e13\u5bb6\u548c\u4ece\u4e1a\u4eba\u5458\u8c01\u9047\u5230\u6570\u636e\u9690\u79c1\u95ee\u9898\uff0c\u6bcf\u5929\u5728\u8fd9\u4e2a\u8bfe\u7a0b\u3002 \u672c\u8bfe\u7a0b\u5c06\u5ba1\u67e5\u793e\u4ea4\u5a92\u4f53\u548c\u4eba\u5de5\u667a\u80fd\u80cc\u666f\u4e0b\u7684\u6570\u636e\u9690\u79c1\u7406\u8bba\u548c\u6570\u636e\u9690\u79c1\u3002 \u5b83\u8fd8\u5c06\u63a2\u8ba8\u65b0\u95fb\u3001\u76d1\u63a7\u3001\u9762\u90e8\u8bc6\u522b\u548c\u751f\u7269\u8bc6\u522b\u7b49\u65b0\u6280\u672f\u4e2d\u7684\u6570\u636e\u9690\u79c1\u95ee\u9898\u3002 \u8bfe\u7a0b\u7684\u5b8c\u6210\u5c06\u4f7f\u53c2\u4e0e\u8005\u6709\u8d44\u683c\u83b7\u5f97 CPE \u5b66\u5206\u3002<\/p>\n\n<h3 class=\"wp-block-heading\" id=\"h-what-you-will-learn-5\">\u60a8\u5c06\u5b66\u5230\u4ec0\u4e48\uff1a<\/h3>\n\n<ul class=\"wp-block-list\"><li>\u786e\u5b9a\u5bf9\u6570\u5b57\u65f6\u4ee3\u9690\u79c1\u6982\u5ff5\u548c\u7406\u8bba\u7684\u57fa\u7840\u7406\u89e3<\/li><li>\u73b0\u4ee3\u6570\u5b57\u6280\u672f\u7684\u9690\u79c1\u5f71\u54cd<\/li><li>\u6280\u672f\u65f6\u4ee3\u6570\u636e\u9690\u79c1\u7684\u89c4\u5219\u548c\u6846\u67b6<\/li><li>\u786e\u5b9a\u9053\u5fb7\u9ed1\u5ba2\u539f\u5219\u548c\u7b56\u7565<\/li><\/ul>\n\n<h3 class=\"wp-block-heading\" id=\"h-skills-you-will-gain-11\">\u60a8\u5c06\u83b7\u5f97\u7684\u6280\u80fd\uff1a<\/h3>\n\n<ul class=\"wp-block-list\"><li>\u7b2c\u56db\u4fee\u6b63\u6848<\/li><li>\u4fe1\u606f\u4f26\u7406<\/li><li>\u751f\u7269\u6d4b\u5b9a\u5b66<\/li><li>\u4fe1\u606f\u9690\u79c1<\/li><li>\u7b97\u6cd5<\/li><li>\u57fa\u672c\u7684\u9053\u5fb7\u9ed1\u5ba2\u6280\u80fd<\/li><\/ul>\n\n<h3 class=\"wp-block-heading\" id=\"h-syllabus-what-you-will-learn-from-this-course-9\"><strong>\u6559\u5b66\u5927\u7eb2 &#8211; \u60a8\u5c06\u4ece\u672c\u8bfe\u7a0b\u4e2d\u5b66\u5230\u4ec0\u4e48<\/strong><\/h3>\n\n<ul class=\"wp-block-list\"><li>\u6570\u5b57\u65f6\u4ee3\u7684\u9690\u79c1<\/li><li>\u6570\u636e\u9690\u79c1\u98ce\u9669<\/li><li>\u6570\u636e\u9690\u79c1\u6cd5\u6846\u67b6<\/li><\/ul>\n\n<h2 class=\"wp-block-heading\" id=\"h-securing-digital-democracy\">\u786e\u4fdd\u6570\u5b57\u6c11\u4e3b<\/h2>\n\n<p>\u5728\u6b64\u8bfe\u7a0b\u4e2d\uff0c\u60a8\u5c06\u4e86\u89e3\u6bcf\u4e2a\u516c\u6c11\u5e94\u8be5\u4e86\u89e3\u7684\u5b89\u5168\u98ce\u9669\u3001\u9053\u5fb7\u9ed1\u5ba2\u884c\u4e3a\u3001\u8fdd\u89c4\u884c\u4e3a\u4ee5\u53ca\u672a\u6765\u7535\u5b50\u6295\u7968\u7684\u6f5c\u529b\u3002 \u6211\u4eec\u5c06\u56de\u987e\u9009\u4e3e\u6280\u672f\u7684\u8fc7\u53bb\u3001\u73b0\u5728\u548c\u672a\u6765\uff0c\u63a2\u7d22\u6295\u7968\u6240\u4ea4\u7ec7\u7684\u5404\u79cd\u7a7a\u95f4\uff0c\u5305\u62ec\u8ba1\u7b97\u673a\u5b89\u5168\u3001\u4eba\u4e3a\u56e0\u7d20\u3001\u516c\u5171\u653f\u7b56\u7b49\u3002<\/p>\n\n<h3 class=\"wp-block-heading\" id=\"h-skills-you-will-gain-12\">\u60a8\u5c06\u83b7\u5f97\u7684\u6280\u80fd\uff1a<\/h3>\n\n<ul class=\"wp-block-list\"><li>\u8f6f\u4ef6\u6d4b\u8bd5<\/li><li>\u7f51\u7edc\u5b89\u5168\u9053\u5fb7\u6280\u80fd<\/li><li>\u53ef\u7528\u6027<\/li><li>\u64cd\u4f5c\u7cfb\u7edf<\/li><\/ul>\n\n<h3 class=\"wp-block-heading\" id=\"h-what-you-will-learn-6\"><strong>\u60a8\u5c06\u5b66\u5230\u4ec0\u4e48\uff1a<\/strong><\/h3>\n\n<ul class=\"wp-block-list\"><li>\u6295\u7968\u4f5c\u4e3a\u5b89\u5168\u95ee\u9898<\/li><li>\u6295\u7968\u65f6\u7684\u8ba1\u7b97\u673a<\/li><li>\u4e16\u754c\u5404\u5730\u7684\u5b89\u5168\u7a0b\u5e8f\u548c\u6295\u7968<\/li><li>\u4eba\u4e3a\u56e0\u7d20\u4e0e\u4e92\u8054\u7f51\u6295\u7968<\/li><li>\u65b0\u6280\u672f\u548c\u653f\u7b56<\/li><li>\u4e86\u89e3\u4ec0\u4e48\u662f\u9053\u5fb7\u9ed1\u5ba2<\/li><\/ul>\n\n<div class=\"wp-block-buttons is-horizontal is-content-justification-center is-layout-flex wp-container-core-buttons-is-layout-499968f5 wp-block-buttons-is-layout-flex\">\n<div class=\"wp-block-button\"><a class=\"wp-block-button__link\" href=\"https:\/\/imp.i384100.net\/c\/3308140\/1164545\/14726?u=https%3A%2F%2Fwww.coursera.org%2Flearn%2Fnortheastern-data-privacy\" target=\"_blank\" rel=\"noreferrer noopener\">\u73b0\u5728\u6ce8\u518c<\/a><\/div>\n<\/div>\n\n<hr class=\"wp-block-separator\"\/>\n\n<h2 class=\"wp-block-heading\" id=\"h-networks-and-communications-security\"><a href=\"https:\/\/imp.i384100.net\/c\/3308140\/1164545\/14726?u=https%3A%2F%2Fwww.coursera.org%2Flearn%2Fnetwork-security-communications-sscp\" target=\"_blank\" rel=\"noreferrer noopener\">\u7f51\u7edc\u548c\u901a\u4fe1\u5b89\u5168<\/a><\/h2>\n\n<p>\u5728\u7f51\u7edc\u548c\u901a\u4fe1\u5b89\u5168\u8bfe\u7a0b\u4e2d\uff0c\u60a8\u5c06\u4e86\u89e3\u7f51\u7edc\u7ed3\u6784\u3001\u9053\u5fb7\u9ed1\u5ba2\u3001\u6570\u636e\u4f20\u8f93\u65b9\u6cd5\u3001\u4f20\u8f93\u683c\u5f0f\u4ee5\u53ca\u7528\u4e8e\u7ef4\u62a4\u6240\u4f20\u8f93\u4fe1\u606f\u7684\u5b8c\u6574\u6027\u3001\u53ef\u7528\u6027\u3001\u8eab\u4efd\u9a8c\u8bc1\u548c\u4fdd\u5bc6\u6027\u7684\u5b89\u5168\u63aa\u65bd\u3002 \u5c06\u8ba8\u8bba\u516c\u5171\u548c\u79c1\u4eba\u901a\u4fe1\u7f51\u7edc\u7684\u6982\u5ff5\u3002<\/p>\n\n<h3 class=\"wp-block-heading\" id=\"h-what-you-will-learn-7\"><strong>\u60a8\u5c06\u5b66\u5230\u4ec0\u4e48\uff1a<\/strong><\/h3>\n\n<ul class=\"wp-block-list\"><li>\u63cf\u8ff0\u4e0e\u7f51\u7edc\u76f8\u5173\u7684\u5b89\u5168\u95ee\u9898<\/li><li>\u786e\u5b9a\u7535\u4fe1\u6280\u672f\u7684\u4fdd\u62a4\u63aa\u65bd<\/li><li>\u5b9a\u4e49\u63a7\u5236\u7f51\u7edc\u8bbf\u95ee\u7684\u8fc7\u7a0b<\/li><li>\u786e\u5b9a\u7ba1\u7406\u57fa\u4e8e LAN \u7684\u5b89\u5168\u7684\u6d41\u7a0b<\/li><li>\u63cf\u8ff0\u57fa\u4e8e\u7f51\u7edc\u7684\u5b89\u5168\u8bbe\u5907\u7684\u64cd\u4f5c\u548c\u914d\u7f6e\u7a0b\u5e8f<\/li><li>\u5b9a\u4e49\u5b9e\u65bd\u548c\u64cd\u4f5c\u65e0\u7ebf\u6280\u672f\u7684\u7a0b\u5e8f<\/li><\/ul>\n\n<h3 class=\"wp-block-heading\" id=\"h-syllabus-what-you-will-learn-from-this-course-10\"><strong>\u6559\u5b66\u5927\u7eb2 &#8211; \u60a8\u5c06\u4ece\u672c\u8bfe\u7a0b\u4e2d\u5b66\u5230\u4ec0\u4e48<\/strong><\/h3>\n\n<ul class=\"wp-block-list\"><li>\u4e86\u89e3\u4e0e\u7f51\u7edc\u76f8\u5173\u7684\u5b89\u5168\u95ee\u9898<\/li><li>\u4fdd\u62a4\u7535\u4fe1\u6280\u672f\u548c\u63a7\u5236\u7f51\u7edc\u63a5\u5165<\/li><li>\u57fa\u4e8e\u7f51\u7edc\u7684\u5b89\u5168\u8bbe\u5907\u7684\u64cd\u4f5c\u548c\u914d\u7f6e<\/li><li>\u7ba1\u7406\u57fa\u4e8e\u5c40\u57df\u7f51\u7684\u5b89\u5168\u6027\u4ee5\u53ca\u65e0\u7ebf\u6280\u672f\u7684\u5b9e\u73b0\u548c\u64cd\u4f5c<\/li><li>\u4e2a\u6848\u7814\u7a76<\/li><li>\u8bfe\u7a0b\u672b\u671f\u8bc4\u4f30<\/li><\/ul>\n\n<div class=\"wp-block-buttons is-horizontal is-content-justification-center is-layout-flex wp-container-core-buttons-is-layout-499968f5 wp-block-buttons-is-layout-flex\">\n<div class=\"wp-block-button\"><a class=\"wp-block-button__link\" href=\"https:\/\/imp.i384100.net\/c\/3308140\/1164545\/14726?u=https%3A%2F%2Fwww.coursera.org%2Flearn%2Fnetwork-security-communications-sscp\" target=\"_blank\" rel=\"noreferrer noopener\">\u73b0\u5728\u6ce8\u518c<\/a><\/div>\n<\/div>\n\n<hr class=\"wp-block-separator\"\/>\n\n<h2 class=\"wp-block-heading\" id=\"h-personnel-third-party-security\"><a href=\"https:\/\/imp.i384100.net\/c\/3308140\/1164545\/14726?u=https%3A%2F%2Fwww.coursera.org%2Flearn%2Finternal-risk-mitigation\" target=\"_blank\" rel=\"noreferrer noopener\">\u4eba\u5458\u4e0e\u7b2c\u4e09\u65b9\u5b89\u5168<\/a><\/h2>\n\n<p>\u5728\u672c\u8bfe\u7a0b\u4e2d\uff0c\u60a8\u5c06\u4e86\u89e3\u5b9e\u65bd\u9053\u5fb7\u9ed1\u5ba2\u7a0b\u5e8f\u4ee5\u8fdb\u884c\u6709\u6548\u7684\u6559\u80b2\u3001\u57f9\u8bad\u548c\u63d0\u9ad8\u8ba4\u8bc6\u8ba1\u5212\u7684\u6240\u6709\u8fc7\u7a0b\u3002 \u60a8\u8fd8\u5c06\u7814\u7a76\u4eba\u5458\u5b89\u5168\u5728\u4fdd\u62a4\u7ec4\u7ec7\u8d44\u4ea7\u3001\u77e5\u8bc6\u4ea7\u6743\u548c\u5b9e\u7269\u8d44\u4ea7\u65b9\u9762\u7684\u4f5c\u7528\u3002 \u60a8\u8fd8\u5c06\u88ab\u4ecb\u7ecd\u5230\u6709\u6548\u4f9b\u5e94\u5546\u98ce\u9669\u7ba1\u7406 \uff08VRM\uff09 \u6240\u9700\u7684\u6b65\u9aa4\uff0c\u5305\u62ec\u5c3d\u804c\u8c03\u67e5\u3001\u5408\u540c\u3001\u76d1\u63a7\u548c\u8bbf\u95ee\u4ee5\u53ca\u7ec8\u6b62\u3002 \u5728\u6574\u4e2a\u8bfe\u7a0b\u4e2d\uff0c\u60a8\u5c06\u53c2\u4e0e\u5f53\u524d\u7684\u6848\u4f8b\u7814\u7a76\uff0c\u4ee5\u9610\u660e\u60a8\u8bfe\u7a0b\u7684\u5173\u952e\u6982\u5ff5\u3002 \u60a8\u8fd8\u6709\u673a\u4f1a\u63d0\u4ea4\u4f5c\u4e1a\uff0c\u4ee5\u4fbf\u5c06\u6750\u6599\u5e94\u7528\u5230\u5b9e\u9645\u5e94\u7528\u4e2d\u3002<\/p>\n\n<h3 class=\"wp-block-heading\" id=\"h-syllabus-what-you-will-learn-from-this-course-11\"><strong>\u6559\u5b66\u5927\u7eb2 &#8211; \u60a8\u5c06\u4ece\u672c\u8bfe\u7a0b\u4e2d\u5b66\u5230\u4ec0\u4e48<\/strong><\/h3>\n\n<ul class=\"wp-block-list\"><li>\u6559\u80b2\u3001\u57f9\u8bad\u548c\u610f\u8bc6<\/li><li>\u4eba\u5458\u5b89\u5168<\/li><li>\u9053\u5fb7\u9ed1\u5ba2\u7684\u7b80\u4ecb<\/li><li>\u4f9b\u5e94\u5546\u98ce\u9669\u7ba1\u7406<\/li><li>\u6536\u8d2d\u7b56\u7565<\/li><\/ul>\n\n<div class=\"wp-block-buttons is-horizontal is-content-justification-center is-layout-flex wp-container-core-buttons-is-layout-499968f5 wp-block-buttons-is-layout-flex\">\n<div class=\"wp-block-button\"><a class=\"wp-block-button__link\" href=\"https:\/\/imp.i384100.net\/c\/3308140\/1164545\/14726?u=https%3A%2F%2Fwww.coursera.org%2Flearn%2Finternal-risk-mitigation\" target=\"_blank\" rel=\"noreferrer noopener\">\u73b0\u5728\u6ce8\u518c<\/a><\/div>\n<\/div>\n\n<hr class=\"wp-block-separator\"\/>\n\n<p>\u60a8\u4e5f\u53ef\u4ee5 <a href=\"https:\/\/iotworlds.com\/?p=541510#x7C7B;&#038;\" target=\"_blank\" rel=\"noreferrer noopener\">\u5728\u8fd9\u91cc<\/a>\u67e5\u770b\u6211\u4eec\u7684\u5176\u4ed6\u8bfe\u7a0b\u3002<\/p>\n","protected":false},"excerpt":{"rendered":"<p>\u9053\u5fb7\u9ed1\u5ba2\u662f\u4e00\u4e2a\u975e\u5e38\u4ee4\u4eba\u5174\u594b\u7684\u5b66\u4e60\u8def\u5f84\uff0c\u53ef&hellip;<\/p>\n","protected":false},"author":1,"featured_media":330699,"comment_status":"closed","ping_status":"open","sticky":false,"template":"","format":"standard","meta":{"_acf_changed":false,"_lmt_disableupdate":"","_lmt_disable":"","footnotes":""},"categories":[2015],"tags":[2209,2210,2208,2206,2212,2211,2207],"class_list":["post-379119","post","type-post","status-publish","format-standard","has-post-thumbnail","hentry","category-2015","tag-2209","tag--zh-hans","tag-2208","tag-2206","tag-2212","tag-2211","tag-2207"],"acf":[],"_links":{"self":[{"href":"https:\/\/iotworlds.com\/zh-hans\/wp-json\/wp\/v2\/posts\/379119","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/iotworlds.com\/zh-hans\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/iotworlds.com\/zh-hans\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/iotworlds.com\/zh-hans\/wp-json\/wp\/v2\/users\/1"}],"replies":[{"embeddable":true,"href":"https:\/\/iotworlds.com\/zh-hans\/wp-json\/wp\/v2\/comments?post=379119"}],"version-history":[{"count":0,"href":"https:\/\/iotworlds.com\/zh-hans\/wp-json\/wp\/v2\/posts\/379119\/revisions"}],"wp:featuredmedia":[{"embeddable":true,"href":"https:\/\/iotworlds.com\/zh-hans\/wp-json\/wp\/v2\/media\/330699"}],"wp:attachment":[{"href":"https:\/\/iotworlds.com\/zh-hans\/wp-json\/wp\/v2\/media?parent=379119"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/iotworlds.com\/zh-hans\/wp-json\/wp\/v2\/categories?post=379119"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/iotworlds.com\/zh-hans\/wp-json\/wp\/v2\/tags?post=379119"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}