Cybersecurity and Its Ten Domains

Location type
Logo Coursera
Provider rating: starstarstarstar_borderstar_border 6.3 Coursera has an average rating of 6.3 (out of 4 reviews)

Need more information? Get more details on the site of the provider.

Description

When you enroll for courses through Coursera you get to choose for a paid plan or for a free plan

  • Free plan: No certicification and/or audit only. You will have access to all course materials except graded items.
  • Paid plan: Commit to earning a Certificate—it's a trusted, shareable way to showcase your new skills.

About this course: This course is designed to introduce students, working professionals and the community to the exciting field of cybersecurity. Throughout the MOOC, participants will engage in community discourse and online interaction. Participants will gain knowledge and understanding of cybersecurity and its domains. They will engage with expertly produced videos, gain insight from industry experts, participate in knowledge assessments, practice assessing their environmental awareness, and gain access to materials that address governance and risk management, compliance, business continuity and disaster recovery, cryptography, software development security, access control, network s…

Read the complete description

Frequently asked questions

There are no frequently asked questions yet. Send an Email to info@springest.co.uk

When you enroll for courses through Coursera you get to choose for a paid plan or for a free plan

  • Free plan: No certicification and/or audit only. You will have access to all course materials except graded items.
  • Paid plan: Commit to earning a Certificate—it's a trusted, shareable way to showcase your new skills.

About this course: This course is designed to introduce students, working professionals and the community to the exciting field of cybersecurity. Throughout the MOOC, participants will engage in community discourse and online interaction. Participants will gain knowledge and understanding of cybersecurity and its domains. They will engage with expertly produced videos, gain insight from industry experts, participate in knowledge assessments, practice assessing their environmental awareness, and gain access to materials that address governance and risk management, compliance, business continuity and disaster recovery, cryptography, software development security, access control, network security, security architecture, security operations, and physical and environmental security. Learning will be assessed using strategies aligned to knowledge and understanding. You do not need prior experience in IT security to do well in this course. All you need is a willingness to learn. We will point you to relevant open and free resources to assist you. At the end of this course, you will have the option of applying for undergraduate level course credit at Kennesaw State University (dependent on admission to Kennesaw State University as a degree seeking or a non-degree seeking student). More information is available in final module "Receive Course (undergraduate) Credit at Kennesaw State University".

Who is this class for: This course is designed for anyone and everyone interested in cybersecurity.

Created by:  University System of Georgia
  • Taught by:  Dr. Humayun Zafar, Associate Professor of Information Security and Assurance

    Information Systems
Level Beginner Commitment 6 hours of videos, quizzes and peer review Language English, Subtitles: French, Chinese (Simplified), Greek, Italian, Portuguese (Brazilian), Dutch How To Pass Pass all graded assignments to complete the course. User Ratings 4.1 stars Average User Rating 4.1See what learners said Coursework

Each course is like an interactive textbook, featuring pre-recorded videos, quizzes and projects.

Help from your peers

Connect with thousands of other learners and debate ideas, discuss course material, and get help mastering concepts.

Certificates

Earn official recognition for your work, and share your success with friends, colleagues, and employers.

University System of Georgia The University System of Georgia is composed of 28 higher education institutions including 4 research universities, 2 regional universities, 12 state universities, 13 state colleges and the Skidaway Institute of Oceanography. The Georgia Public Library System, encompassing 61 library systems throughout Georgia, is also part of the University System.

Syllabus


WEEK 1


Welcome and Course Overview
Checkout our marquee speaker. She's the Chief Privacy Officer at Coca Cola.


2 videos, 3 readings expand


  1. Video: Welcome to "Cybersecurity and Its Ten Domains"
  2. Reading: Welcome to the Course
  3. Video: The Importance of Cybersecurity
  4. Reading: Meet the Instructor
  5. Reading: Course Objectives

Graded: Test Your Existing Knowledge

WEEK 2


Introduction to Security, Access Control, and Software Development Security



In this module we cover some of the fundamentals of security that will assist you throughout the course. We will then introduce you to two domains of cyber security: access control and software development security. Focus will be on areas such as confidentiality, integrity, and availability, as well secure software development techniques.


4 videos, 1 reading expand


  1. Video: Module Overview
  2. Reading: Module Readings
  3. Video: Introduction to Security
  4. Video: Access Control
  5. Video: Software Development Security

Graded: Discussion -- Role of Cyber Security
Graded: Introduction to Security, Access Control, and Software Development Security Quiz

WEEK 3


Business Continuity and Disaster Recovery Planning and Cryptography



In this module we are going to delve a little deeper into cyber security by covering business continuity and disaster recovery planning and cryptography. Learners will be exposed to what a disruptive event is and how the federal government through agencies such as FEMA handles disasters. We will also covers encryption and decryption and the various techniques used.


3 videos, 1 reading expand


  1. Video: Module Overview
  2. Reading: Module Readings
  3. Video: Business Continuity and Disaster Recovery Planning
  4. Video: Cryptography

Graded: Business Continuity and Disaster Recovery Planning and Cryptography Quiz

WEEK 4


Information Security Governance and Risk Management & Legal, Regulations, Investigations, and Compliance



In this module we are going to cover some of the non-technical topics associated to cyber security: Information security governance and risk management and legal, regulations, investigations, and compliance. It is important to realize, that non-technical does not mean easy, or not important. In fact, I would like to argue that they are more important that the technical side of cyber security.


3 videos, 1 reading expand


  1. Video: Module Overview
  2. Reading: Module Readings
  3. Video: Information Security Governance and Risk Management
  4. Video: Legal, Regulations, Investigations, and Compliance

Graded: Information Security Governance and Risk Management & Legal, Regulations, Investigations, and Compliance Quiz

WEEK 5


Operations Security & Physical and Environmental Security



In this module we are going to cover what amount to some of the more intuitive parts of cybersecurity: operations security and physical and environmental security. Learners will understand operations security from a competitor/enemy/hacker’s viewpoint and then develop and apply countermeasures accordingly. Learners will also be exposed to electric power issues such as brownouts, fire detection and suppression, and HVAC.


3 videos, 1 reading expand


  1. Video: Module Overview
  2. Reading: Module Readings
  3. Video: Operations Security
  4. Video: Physical and Environmental Security

Graded: Operations Security & Physical and Environmental Security Quiz

WEEK 6


Security Architecture and Design & Telecommunications and Network Security



In this module we are going to cover some of the most technical and comprehensive topics that cyber security has to offer as we look at Security Architecture and Design and Telecommunications and Network Security. Learners will be exposed to security models such as Bell LaPadula, Clark-Wilson, Mandatory Access Control (MAC), Discretionary Access Control (DAC), Role-Based Access Control (RBAC), and Access Matrix. We will also describe the Open Systems Interconnect (OSI) model and its seven layers.


3 videos, 2 readings expand


  1. Video: Module Overview
  2. Reading: Module Readings
  3. Video: Security Architecture and Design
  4. Video: Telecommunications and Network Security
  5. Reading: TEDx Talk - Pablos Holman

Graded: Security Architecture and Design & Telecommunications and Network Security Quiz
Graded: Course Certificate Final Exam

WEEK 7


Receive Undergraduate Course Credit at Kennesaw State University
In this module we provide details about leveraging this MOOC for credit at the undergraduate level at Kennesaw State University. It is very important that learners follow directions carefully.


1 reading expand


  1. Reading: Receiving Credit Overview
There are no reviews yet.

Share your review

Do you have experience with this course? Submit your review and help other people make the right choice. As a thank you for your effort we will donate £1.- to Stichting Edukans.

There are no frequently asked questions yet. Send an Email to info@springest.co.uk