Acerca de este Curso
4.2
1,052 calificaciones
335 revisiones
100% online

100% online

Comienza de inmediato y aprende a tu propio ritmo.
Fechas límite flexibles

Fechas límite flexibles

Restablece las fechas límite en función de tus horarios.
Nivel principiante

Nivel principiante

Hours to complete

Aprox. 8 horas para completar

Sugerido: 6 hours of videos, quizzes and peer review...
Available languages

Inglés (English)

Subtítulos: Inglés (English), Francés (French), Chino (simplificado), Griego, Italiano, Portugués (de Brasil), Vietnamita, Neerlandés, Persian...

Habilidades que obtendrás

CybersecurityCryptographyInformation Security (INFOSEC)Cyber-Security Regulation
100% online

100% online

Comienza de inmediato y aprende a tu propio ritmo.
Fechas límite flexibles

Fechas límite flexibles

Restablece las fechas límite en función de tus horarios.
Nivel principiante

Nivel principiante

Hours to complete

Aprox. 8 horas para completar

Sugerido: 6 hours of videos, quizzes and peer review...
Available languages

Inglés (English)

Subtítulos: Inglés (English), Francés (French), Chino (simplificado), Griego, Italiano, Portugués (de Brasil), Vietnamita, Neerlandés, Persian...

Programa - Qué aprenderás en este curso

Semana
1
Hours to complete
1 hora para completar

Welcome and Course Overview

Checkout our marquee speaker. She's the Chief Privacy Officer at Coca Cola. ...
Reading
2 videos (Total: 4 min), 3 readings, 1 quiz
Video2 videos
The Importance of Cybersecurity1m
Reading3 lecturas
Welcome to the Course10m
Meet the Instructor10m
Course Objectives10m
Quiz1 ejercicio de práctica
Test Your Existing Knowledge20m
Semana
2
Hours to complete
6 horas para completar

Introduction to Security, Access Control, and Software Development Security

In this module we cover some of the fundamentals of security that will assist you throughout the course. We will then introduce you to two domains of cyber security: access control and software development security. Focus will be on areas such as confidentiality, integrity, and availability, as well secure software development techniques....
Reading
4 videos (Total: 11 min), 1 reading, 2 quizzes
Video4 videos
Introduction to Security3m
Access Control2m
Software Development Security3m
Reading1 lectura
Module Readings10m
Quiz1 ejercicio de práctica
Introduction to Security, Access Control, and Software Development Security Quiz28m
Semana
3
Hours to complete
5 horas para completar

Business Continuity and Disaster Recovery Planning and Cryptography

In this module we are going to delve a little deeper into cyber security by covering business continuity and disaster recovery planning and cryptography. Learners will be exposed to what a disruptive event is and how the federal government through agencies such as FEMA handles disasters. We will also covers encryption and decryption and the various techniques used....
Reading
3 videos (Total: 5 min), 1 reading, 1 quiz
Video3 videos
Business Continuity and Disaster Recovery Planning2m
Cryptography1m
Reading1 lectura
Module Readingsm
Quiz1 ejercicio de práctica
Business Continuity and Disaster Recovery Planning and Cryptography Quiz36m
Semana
4
Hours to complete
4 horas para completar

Information Security Governance and Risk Management & Legal, Regulations, Investigations, and Compliance

In this module we are going to cover some of the non-technical topics associated to cyber security: Information security governance and risk management and legal, regulations, investigations, and compliance. It is important to realize, that non-technical does not mean easy, or not important. In fact, I would like to argue that they are more important that the technical side of cyber security....
Reading
3 videos (Total: 5 min), 1 reading, 1 quiz
Video3 videos
Information Security Governance and Risk Management1m
Legal, Regulations, Investigations, and Compliance2m
Reading1 lectura
Module Readings10m
Quiz1 ejercicio de práctica
Information Security Governance and Risk Management & Legal, Regulations, Investigations, and Compliance Quiz38m

Instructor

Avatar

Dr. Humayun Zafar

Associate Professor of Information Security and Assurance
Information Systems

Acerca de University System of Georgia

The University System of Georgia is composed of 28 higher education institutions including 4 research universities, 2 regional universities, 12 state universities, 13 state colleges and the Skidaway Institute of Oceanography. The Georgia Public Library System, encompassing 61 library systems throughout Georgia, is also part of the University System....

Preguntas Frecuentes

  • Una vez que te inscribes para obtener un Certificado, tendrás acceso a todos los videos, cuestionarios y tareas de programación (si corresponde). Las tareas calificadas por compañeros solo pueden enviarse y revisarse una vez que haya comenzado tu sesión. Si eliges explorar el curso sin comprarlo, es posible que no puedas acceder a determinadas tareas.

  • Cuando compras un Certificado, obtienes acceso a todos los materiales del curso, incluidas las tareas calificadas. Una vez que completes el curso, se añadirá tu Certificado electrónico a la página Logros. Desde allí, puedes imprimir tu Certificado o añadirlo a tu perfil de LinkedIn. Si solo quieres leer y visualizar el contenido del curso, puedes participar del curso como oyente sin costo.

¿Tienes más preguntas? Visita el Centro de Ayuda al Alumno.