Acerca de este Curso
2,743 vistas recientes

100 % en línea

Comienza de inmediato y aprende a tu propio ritmo.

Fechas límite flexibles

Restablece las fechas límite en función de tus horarios.

Nivel principiante

Aprox. 9 horas para completar

Sugerido: 4 weeks of study, 3-4 hours/week...

Inglés (English)

Subtítulos: Inglés (English)

100 % en línea

Comienza de inmediato y aprende a tu propio ritmo.

Fechas límite flexibles

Restablece las fechas límite en función de tus horarios.

Nivel principiante

Aprox. 9 horas para completar

Sugerido: 4 weeks of study, 3-4 hours/week...

Inglés (English)

Subtítulos: Inglés (English)

Los estudiantes que toman este Course son

  • Accountants
  • Consultants
  • Business Analysts
  • Project Managers
  • Software Engineers

Programa - Qué aprenderás en este curso

Semana
1
3 horas para completar

Introduction to the X-Factor

4 videos (Total 16 minutos), 5 lecturas, 2 cuestionarios
4 videos
Security and Employee Compliance4m
Industry Q&A: Security and End Users1m
Pulling it together8m
5 lecturas
Learning Objectives1m
MISQ Executive: Information Security Management Overview45m
Phishing Attacks Hurt Convenience Of Online Banking In The Workplace10m
3 things every CISO should know10m
Shadow IT: Mitigating Security Risks10m
1 ejercicios de práctica
Introduction to the X-Factor Quiz10m
Semana
2
2 horas para completar

Security Education: Training & Awareness

4 videos (Total 17 minutos), 4 lecturas, 2 cuestionarios
4 videos
Industry Q&A: SETA in Real Life2m
Industry Q&A: Customers and Security Training2m
Pulling it together5m
4 lecturas
Learning Objectives1m
Security Education, Training and Awareness20m
Training20m
Making Security Awareness Work20m
2 ejercicios de práctica
SETA Practice Quiz20m
Security Education: Training and Awareness Quiz10m
Semana
3
4 horas para completar

Reasons Why Traditional Training Efforts Fail

4 videos (Total 15 minutos), 5 lecturas, 3 cuestionarios
4 videos
Employee Habits, Errors, and Security Breaches4m
Habituation: What is it?5m
Pulling it together3m
5 lecturas
Learning Objectives1m
Why Do Cybersecurity Awareness Campaigns Fail?50m
The Impact of Past Behavior45m
How Does Behavior Become Habitual?20m
Global Threat Report30m
2 ejercicios de práctica
Why Do Cybersecurity Awareness Campaigns Fail Quiz14m
Test Your Knowledge!20m
Semana
4
2 horas para completar

Threat Intelligence

3 videos (Total 14 minutos), 6 lecturas, 2 cuestionarios
3 videos
Industry Q&A: Threat Intelligence2m
Pulling it together5m
6 lecturas
Learning Objectives1m
What is threat intelligence?20m
Rise of Hacktivism20m
Cyber Insurance15m
Protecting yourself from Ransomware10m
Ransomware15m
2 ejercicios de práctica
Practice quiz: Test your threat intelligence!20m
Test your knowledge of threat intelligence10m
4.6
23 revisionesChevron Right

25%

comenzó una nueva carrera después de completar estos cursos

25%

consiguió un beneficio tangible en su carrera profesional gracias a este curso

Principales revisiones sobre Cybersecurity and the X-Factor

por ZLMar 19th 2017

There is a lot of practical and actionable information in this course related to cybersecurity. I would highly recommend anyone interested in their organization's cybersecurity take this course!

por JRApr 17th 2017

Great course, understanding that our biggest security threat is our own behaviour is key to building cybersecurity.

Instructores

Avatar

Dr. Humayun Zafar

Associate Professor of Information Security and Assurance
Information Systems
Avatar

Dr. Traci Carte

Associate Professor Chair, Information Systems
Information Systems
Avatar

Herbert J. Mattord, Ph.D., CISM, CISSP, CDP

Associate Professor in Information Security and Assurance
Information Systems
Avatar

Mr. Andy Green

Lecturer of Information Security and Assurance
Kennesaw State University - Department of Information Systems
Avatar

Michael Whitman, Ph.D., CISM, CISSP

Professor of Information Security
Information Systems

Acerca de Sistema Universitario de Georgia

The University System of Georgia is composed of 28 higher education institutions including 4 research universities, 2 regional universities, 12 state universities, 13 state colleges and the Skidaway Institute of Oceanography. The Georgia Public Library System, encompassing 61 library systems throughout Georgia, is also part of the University System....

Acerca de Programa especializado Cybersecurity: Developing a Program for Your Business

Cybersecurity is an essential business skill for the evolving workplace. For-profit companies, government agencies, and not-for-profit organizations all need technologically proficient, business-savvy information technology security professionals. In this Specialization, you will learn about a variety of processes for protecting business assets through policy, education and training, and technology best practices. You’ll develop an awareness of the risks and cyber threats or attacks associated with modern information usage, and explore key technical and managerial topics required for a balanced approach to information protection. Topics will include mobility, the Internet of Things, the human factor, governance and management practices....
Cybersecurity: Developing a Program for Your Business

Preguntas Frecuentes

  • Una vez que te inscribes para obtener un Certificado, tendrás acceso a todos los videos, cuestionarios y tareas de programación (si corresponde). Las tareas calificadas por compañeros solo pueden enviarse y revisarse una vez que haya comenzado tu sesión. Si eliges explorar el curso sin comprarlo, es posible que no puedas acceder a determinadas tareas.

  • Cuando te inscribes en un curso, obtienes acceso a todos los cursos que forman parte del Programa especializado y te darán un Certificado cuando completes el trabajo. Se añadirá tu Certificado electrónico a la página Logros. Desde allí, puedes imprimir tu Certificado o añadirlo a tu perfil de LinkedIn. Si solo quieres leer y visualizar el contenido del curso, puedes auditar el curso sin costo.

¿Tienes más preguntas? Visita el Centro de Ayuda al Alumno.