Acerca de este Curso
29,464 vistas recientes

100 % en línea

Comienza de inmediato y aprende a tu propio ritmo.

Fechas límite flexibles

Restablece las fechas límite en función de tus horarios.

Nivel principiante

Aprox. 8 horas para completar

Sugerido: 6 hours of videos, quizzes and peer review...

Inglés (English)

Subtítulos: Francés (French), Chino (simplificado), Griego, Italiano, Portugués (de Brasil), Vietnamita, Neerlandés, Inglés (English), Persa...

Habilidades que obtendrás

CybersecurityCryptographyInformation Security (INFOSEC)Cyber-Security Regulation

100 % en línea

Comienza de inmediato y aprende a tu propio ritmo.

Fechas límite flexibles

Restablece las fechas límite en función de tus horarios.

Nivel principiante

Aprox. 8 horas para completar

Sugerido: 6 hours of videos, quizzes and peer review...

Inglés (English)

Subtítulos: Francés (French), Chino (simplificado), Griego, Italiano, Portugués (de Brasil), Vietnamita, Neerlandés, Inglés (English), Persa...

Programa - Qué aprenderás en este curso

Semana
1
1 hora para completar

Welcome and Course Overview

Checkout our marquee speaker. She's the Chief Privacy Officer at Coca Cola. ...
2 videos (Total 4 minutos), 3 readings, 1 quiz
2 videos
The Importance of Cybersecurity1m
3 lecturas
Welcome to the Course10m
Meet the Instructor10m
Course Objectives10m
1 ejercicio de práctica
Test Your Existing Knowledge20m
Semana
2
6 horas para completar

Introduction to Security, Access Control, and Software Development Security

In this module we cover some of the fundamentals of security that will assist you throughout the course. We will then introduce you to two domains of cyber security: access control and software development security. Focus will be on areas such as confidentiality, integrity, and availability, as well secure software development techniques....
4 videos (Total 11 minutos), 1 reading, 2 quizzes
4 videos
Introduction to Security3m
Access Control2m
Software Development Security3m
1 lectura
Module Readings10m
1 ejercicio de práctica
Introduction to Security, Access Control, and Software Development Security Quiz28m
Semana
3
5 horas para completar

Business Continuity and Disaster Recovery Planning and Cryptography

In this module we are going to delve a little deeper into cyber security by covering business continuity and disaster recovery planning and cryptography. Learners will be exposed to what a disruptive event is and how the federal government through agencies such as FEMA handles disasters. We will also covers encryption and decryption and the various techniques used....
3 videos (Total 5 minutos), 1 reading, 1 quiz
3 videos
Business Continuity and Disaster Recovery Planning2m
Cryptography1m
1 lectura
Module Readingss
1 ejercicio de práctica
Business Continuity and Disaster Recovery Planning and Cryptography Quiz36m
Semana
4
4 horas para completar

Information Security Governance and Risk Management & Legal, Regulations, Investigations, and Compliance

In this module we are going to cover some of the non-technical topics associated to cyber security: Information security governance and risk management and legal, regulations, investigations, and compliance. It is important to realize, that non-technical does not mean easy, or not important. In fact, I would like to argue that they are more important that the technical side of cyber security....
3 videos (Total 5 minutos), 1 reading, 1 quiz
3 videos
Information Security Governance and Risk Management1m
Legal, Regulations, Investigations, and Compliance2m
1 lectura
Module Readings10m
1 ejercicio de práctica
Information Security Governance and Risk Management & Legal, Regulations, Investigations, and Compliance Quiz38m
4.2
360 revisionesChevron Right

29%

comenzó una nueva carrera después de completar estos cursos

33%

consiguió un beneficio tangible en su carrera profesional gracias a este curso

12%

consiguió un aumento de sueldo o ascenso

Principales revisiones

por CBMay 4th 2018

The Cybersecurity course was very complete and interesting. I enjoyed forums and videos.\n\nThis course has motivated me to learn more about Information Security.\n\nExcellent content !\n\nRegards

por PPFeb 8th 2016

Superb course with lot of resources to learn concepts. websites really helpful to update knowledge. Simple rules will avoid hefty fines by govt and safeguard brand reputations

Instructor

Avatar

Dr. Humayun Zafar

Associate Professor of Information Security and Assurance
Information Systems

Acerca de Sistema Universitario de Georgia

The University System of Georgia is composed of 28 higher education institutions including 4 research universities, 2 regional universities, 12 state universities, 13 state colleges and the Skidaway Institute of Oceanography. The Georgia Public Library System, encompassing 61 library systems throughout Georgia, is also part of the University System....

Preguntas Frecuentes

  • Una vez que te inscribes para obtener un Certificado, tendrás acceso a todos los videos, cuestionarios y tareas de programación (si corresponde). Las tareas calificadas por compañeros solo pueden enviarse y revisarse una vez que haya comenzado tu sesión. Si eliges explorar el curso sin comprarlo, es posible que no puedas acceder a determinadas tareas.

  • Cuando compras un Certificado, obtienes acceso a todos los materiales del curso, incluidas las tareas calificadas. Una vez que completes el curso, se añadirá tu Certificado electrónico a la página Logros. Desde allí, puedes imprimir tu Certificado o añadirlo a tu perfil de LinkedIn. Si solo quieres leer y visualizar el contenido del curso, puedes participar del curso como oyente sin costo.

¿Tienes más preguntas? Visita el Centro de Ayuda al Alumno.