Acerca de este Curso
5,704 vistas recientes

100 % en línea

Comienza de inmediato y aprende a tu propio ritmo.

Fechas límite flexibles

Restablece las fechas límite en función de tus horarios.

Nivel principiante

Aprox. 9 horas para completar

Sugerido: 4 weeks of study, 2-3 hours/week...

Inglés (English)

Subtítulos: Inglés (English)

100 % en línea

Comienza de inmediato y aprende a tu propio ritmo.

Fechas límite flexibles

Restablece las fechas límite en función de tus horarios.

Nivel principiante

Aprox. 9 horas para completar

Sugerido: 4 weeks of study, 2-3 hours/week...

Inglés (English)

Subtítulos: Inglés (English)

Programa - Qué aprenderás en este curso

Semana
1
3 horas para completar

Welcome to the Course!

3 videos (Total 9 minutos), 6 readings, 2 quizzes
6 lecturas
Learning Objectives2m
Mobility is Changing the World17m
What is Cybersecurity?30m
Enterprise Mobility and Its impact on IT30m
CIO Strategies for Consumerization:The Future of Enterprise Mobile Computing10m
Managing Employees’ Use of Mobile Technologies to Minimize Work-Life Balance Impacts30m
2 ejercicios de práctica
Cybersecurity Reading Quiz16m
Challenge Your Existing Knowledge!30m
Semana
2
3 horas para completar

Mobility Inc.

6 videos (Total 25 minutos), 4 readings, 1 quiz
6 videos
Mobility and the Modern Workforce3m
Mobility and the Internet of Things4m
SAP's Chris and Mandy on BYOD and Policy Management5m
4 lecturas
Learning Objectives2m
Mobility and the Internet of Things – CIO Executive Interview20m
Using Mobile Technology to Improve Maternal Health and Fight Ebola: A Case Study of Mobile Innovation in Nigeria.30m
Increasing Organizational Performance by Transforming into a Mobile Enterprise30m
1 ejercicio de práctica
Mobility Inc. Quiz30m
Semana
3
5 horas para completar

Cybersecurity

3 videos (Total 14 minutos), 5 readings, 3 quizzes
5 lecturas
Learning Objectives2m
Cybersecurity in the Age of Mobility: Building a Mobile Infrastructure that Promotes Productivity30m
Why IT Executives Should Help Employees Secure Their Home Computers30m
Effective Information Security Requires a Balance of Social and Technology Factors.10m
The Evolution of Information Governance at Intel30m
2 ejercicios de práctica
Home Computer Security Reading Quiz16m
Cybersecurity Quiz30m
Semana
4
4 horas para completar

What's Next?

5 videos (Total 12 minutos), 5 readings, 2 quizzes
5 lecturas
Learning Objectives2m
IT Consumerization: When Gadgets Turn into Enterprise IT Tools.30m
Cybersecurity and Mobility: Securing the Mobile Frontier30m
Achieving High Performance in a Mobile and Green Workplace: Lessons from Microsoft Netherlands30m
The Future of Mobility: Scenarios for the United States in 2030.1h 10m
2 ejercicios de práctica
IT Consumerization Reading Quiz16m
Final Quiz30m
4.4
57 revisionesChevron Right

17%

consiguió un beneficio tangible en su carrera profesional gracias a este curso

Principales revisiones sobre Cybersecurity and Mobility

por MTMay 14th 2017

Great Course and Great materials. Very insightful into this very deep subject of Cybersecurity and correlation with other aspects of Technology.

por EIJul 12th 2016

A good introduction to the subject of computer security and mobile security. More of a general subject and not vert in depth, but a great start.

Instructor

Avatar

Dr. Humayun Zafar

Associate Professor of Information Security and Assurance
Information Systems

Acerca de Sistema Universitario de Georgia

The University System of Georgia is composed of 28 higher education institutions including 4 research universities, 2 regional universities, 12 state universities, 13 state colleges and the Skidaway Institute of Oceanography. The Georgia Public Library System, encompassing 61 library systems throughout Georgia, is also part of the University System....

Acerca de Programa especializado Cybersecurity: Developing a Program for Your Business

Cybersecurity is an essential business skill for the evolving workplace. For-profit companies, government agencies, and not-for-profit organizations all need technologically proficient, business-savvy information technology security professionals. In this Specialization, you will learn about a variety of processes for protecting business assets through policy, education and training, and technology best practices. You’ll develop an awareness of the risks and cyber threats or attacks associated with modern information usage, and explore key technical and managerial topics required for a balanced approach to information protection. Topics will include mobility, the Internet of Things, the human factor, governance and management practices....
Cybersecurity: Developing a Program for Your Business

Preguntas Frecuentes

  • Una vez que te inscribes para obtener un Certificado, tendrás acceso a todos los videos, cuestionarios y tareas de programación (si corresponde). Las tareas calificadas por compañeros solo pueden enviarse y revisarse una vez que haya comenzado tu sesión. Si eliges explorar el curso sin comprarlo, es posible que no puedas acceder a determinadas tareas.

  • Cuando te inscribes en un curso, obtienes acceso a todos los cursos que forman parte del Programa especializado y te darán un Certificado cuando completes el trabajo. Se añadirá tu Certificado electrónico a la página Logros. Desde allí, puedes imprimir tu Certificado o añadirlo a tu perfil de LinkedIn. Si solo quieres leer y visualizar el contenido del curso, puedes auditar el curso sin costo.

¿Tienes más preguntas? Visita el Centro de Ayuda al Alumno.