Über diesen Kurs
9,236 recent views

100 % online

Beginnen Sie sofort und lernen Sie in Ihrem eigenen Tempo.

Flexible Fristen

Setzen Sie Fristen gemäß Ihrem Zeitplan zurück.

Stufe „Anfänger“

Ca. 9 Stunden zum Abschließen

Empfohlen: 4 weeks of study, 3-4 hours/week...

Englisch

Untertitel: Englisch

100 % online

Beginnen Sie sofort und lernen Sie in Ihrem eigenen Tempo.

Flexible Fristen

Setzen Sie Fristen gemäß Ihrem Zeitplan zurück.

Stufe „Anfänger“

Ca. 9 Stunden zum Abschließen

Empfohlen: 4 weeks of study, 3-4 hours/week...

Englisch

Untertitel: Englisch

Lehrplan - Was Sie in diesem Kurs lernen werden

Woche
1
3 Stunden zum Abschließen

Introduction to the X-Factor

The X-factor within information security is human behavior within and outside your organization. Our introduction includes an overview of information security management and its goals as well as describing the problem created by non-malicious insider behavior. We include discussion about the purpose of training within organizational cybersecurity efforts and whether it is achieving its purpose.

...
4 Videos (Gesamt 16 min), 5 Lektüren, 2 Quiz
4 Videos
Security and Employee Compliance4m
Industry Q&A: Security and End Users1m
Pulling it together8m
5 Lektüren
Learning Objectives1m
MISQ Executive: Information Security Management Overview45m
Phishing Attacks Hurt Convenience Of Online Banking In The Workplace10m
3 things every CISO should know10m
Shadow IT: Mitigating Security Risks10m
1 praktische Übung
Introduction to the X-Factor Quiz10m
Woche
2
2 Stunden zum Abschließen

Security Education: Training & Awareness

Within this topic we will discuss traditional training efforts. Security education, training and awareness (SETA) programs are designed to reduce the incidence of accidental security breaches. Through the readings you will learn about the design and delivery of these programs as well as various training techniques. This module concludes with a discussion about your experience and opinion about organizational security training.

...
4 Videos (Gesamt 17 min), 4 Lektüren, 2 Quiz
4 Videos
Industry Q&A: SETA in Real Life2m
Industry Q&A: Customers and Security Training2m
Pulling it together5m
4 Lektüren
Learning Objectives1m
Security Education, Training and Awareness20m
Training20m
Making Security Awareness Work20m
2 praktische Übungen
SETA Practice Quiz20m
Security Education: Training and Awareness Quiz10m
Woche
3
4 Stunden zum Abschließen

Reasons Why Traditional Training Efforts Fail

In this module you will understand why traditional training efforts through SETA programs may fail. You will learn about human behavior and how understanding it can help managers better leverage their security efforts. Finally, through the readings you will also see that this is a global issue. The readings present examples of existing awareness campaigns in U.K., in Australia, in Canada and Africa.

...
4 Videos (Gesamt 15 min), 5 Lektüren, 3 Quiz
4 Videos
Employee Habits, Errors, and Security Breaches4m
Habituation: What is it?5m
Pulling it together3m
5 Lektüren
Learning Objectives1m
Why Do Cybersecurity Awareness Campaigns Fail?50m
The Impact of Past Behavior45m
How Does Behavior Become Habitual?20m
Global Threat Report30m
2 praktische Übungen
Why Do Cybersecurity Awareness Campaigns Fail Quiz14m
Test Your Knowledge!20m
Woche
4
2 Stunden zum Abschließen

Threat Intelligence

We will conclude by identifying some novel problems and practices that organizations are experiencing. You will learn about hactivism, cyberinsurance, and ransomware through popular press readings about recent security problems that landed companies on the front page.

...
3 Videos (Gesamt 14 min), 6 Lektüren, 2 Quiz
3 Videos
Industry Q&A: Threat Intelligence2m
Pulling it together5m
6 Lektüren
Learning Objectives1m
What is threat intelligence?20m
Rise of Hacktivism20m
Cyber Insurance15m
Protecting yourself from Ransomware10m
Ransomware15m
2 praktische Übungen
Practice quiz: Test your threat intelligence!20m
Test your knowledge of threat intelligence10m
4.7
23 BewertungenChevron Right

33%

nahm einen neuen Beruf nach Abschluss dieser Kurse auf

33%

ziehen Sie für Ihren Beruf greifbaren Nutzen aus diesem Kurs

Top reviews from Cybersecurity and the X-Factor

von ZLMar 19th 2017

There is a lot of practical and actionable information in this course related to cybersecurity. I would highly recommend anyone interested in their organization's cybersecurity take this course!

von JRApr 17th 2017

Great course, understanding that our biggest security threat is our own behaviour is key to building cybersecurity.

Dozenten

Avatar

Dr. Humayun Zafar

Associate Professor of Information Security and Assurance
Information Systems
Avatar

Dr. Traci Carte

Associate Professor Chair, Information Systems
Information Systems
Avatar

Herbert J. Mattord, Ph.D., CISM, CISSP, CDP

Associate Professor in Information Security and Assurance
Information Systems
Avatar

Mr. Andy Green

Lecturer of Information Security and Assurance
Kennesaw State University - Department of Information Systems
Avatar

Michael Whitman, Ph.D., CISM, CISSP

Professor of Information Security
Information Systems

Über University System of Georgia

The University System of Georgia is composed of 28 higher education institutions including 4 research universities, 2 regional universities, 12 state universities, 13 state colleges and the Skidaway Institute of Oceanography. The Georgia Public Library System, encompassing 61 library systems throughout Georgia, is also part of the University System....

Über die Spezialisierung Cybersecurity: Developing a Program for Your Business

Cybersecurity is an essential business skill for the evolving workplace. For-profit companies, government agencies, and not-for-profit organizations all need technologically proficient, business-savvy information technology security professionals. In this Specialization, you will learn about a variety of processes for protecting business assets through policy, education and training, and technology best practices. You’ll develop an awareness of the risks and cyber threats or attacks associated with modern information usage, and explore key technical and managerial topics required for a balanced approach to information protection. Topics will include mobility, the Internet of Things, the human factor, governance and management practices....
Cybersecurity: Developing a Program for Your Business

Häufig gestellte Fragen

  • Sobald Sie sich für ein Zertifikat angemeldet haben, haben Sie Zugriff auf alle Videos, Quizspiele und Programmieraufgaben (falls zutreffend). Aufgaben, die von anderen Kursteilnehmern bewertet werden, können erst dann eingereicht und überprüft werden, wenn Ihr Unterricht begonnen hat. Wenn Sie sich den Kurs anschauen möchten, ohne ihn zu kaufen, können Sie womöglich auf bestimmte Aufgaben nicht zugreifen.

  • Wenn Sie sich für den Kurs anmelden, erhalten Sie Zugriff auf alle Kurse der Spezialisierung und Sie erhalten nach Abschluss aller Arbeiten ein Zertifikat. Ihr elektronisches Zertifikat wird zu Ihrer Seite „Errungenschaften“ hinzugefügt – von dort können Sie Ihr Zertifikat ausdrucken oder es zu Ihrem LinkedIn Profil hinzufügen. Wenn Sie nur lesen und den Inhalt des Kurses anzeigen möchten, können Sie kostenlos als Gast an dem Kurs teilnehmen.

Haben Sie weitere Fragen? Besuchen Sie das Hilfe-Center für Teiln..