Cyber Security: Protecting Yourself and Your Data
Offered By: IEEE via edX
Course Description
Overview
Our daily lives, economic vitality, and national security all revolve around technology. Our dependence on technology means we need a stable, safe, and resilient cyberspace. However, computers and networks are being misused at a growing rate both by cybercriminals and by our own employees. In this computer science course, you will learn the fundamentals of cybersecurity and basic threats. You will also learn to build a comprehensive security plan that integrates people, processes, and technology, and how to begin protecting yourself and your information.
You will be exposed to areas of personal and physical security, best practices for using our computers and mobile devices, and how we protect our privacy and secure our devices and networks against attacks.
We will examine cybersecurity standards, laws, and ethical issues, the impact of cyber terrorism, how governments use technology and computer systems to defend and attack adversaries, and the effect this has on privacy and individual liberties. We will also explore why IT administrators and cybersecurity professionals need to demonstrate adherence to ethical principles.
Finally, we will look at the important areas of data breach planning and business continuity, both of which are critical to the long-term viability of an organization.
This course will also focus on the types of careers within the cyber security field and how you can enhance your career through professional certifications.
No prior knowledge or skills are required except for basic computer literacy.
Syllabus
Module 2: The Big Picture of Cybersecurity
Module 3: Personal and Physical Security
Module 4: Computer and Application Security
Module 5: Web Security
Module 6: Network Security
Module 7: Mobile and Wireless Security
Module 8: Cybersecurity Standards and Law
Module 9: Data Breach Planning and Business Continuity
Taught by
Amelia Estwick
Tags
Related Courses
Computer SecurityStanford University via Coursera Cryptography II
Stanford University via Coursera Malicious Software and its Underground Economy: Two Sides to Every Story
University of London International Programmes via Coursera Building an Information Risk Management Toolkit
University of Washington via Coursera Introduction to Cybersecurity
National Cybersecurity Institute at Excelsior College via Canvas Network