Programa Especializado - Cybersecurity: Developing a Program for Your Business

Comenzó el mar. 20

Programa Especializado - Cybersecurity: Developing a Program for Your Business

Master the Fundamentals of Cybersecurity

Learn to assess cyber threats and protect business information assets.

Sobre este Programa Especializado

Cybersecurity is an essential business skill for the evolving workplace. For-profit companies, government agencies, and not-for-profit organizations all need technologically proficient, business-savvy information technology security professionals. In this Specialization, you will learn about a variety of processes for protecting business assets through policy, education and training, and technology best practices. You’ll develop an awareness of the risks and cyber threats or attacks associated with modern information usage, and explore key technical and managerial topics required for a balanced approach to information protection. Topics will include mobility, the Internet of Things, the human factor, governance and management practices.

Creada por:

courses
4 courses

Sigue el orden sugerido o elige el tuyo.

projects
Proyectos

Diseñado para ayudarte a practicar y aplicar las habilidades que aprendiste.

certificates
Certificados

Resalta tus nuevas habilidades en tu currículum o LinkedIn.

Cursos
Beginner Specialization.
No prior experience required.
  1. CURSO 1

    Cybersecurity and Mobility

    Sesión actual: mar. 20 — abr. 24.
    Dedicación
    4 semanas de estudio, 2-3 horas por semana
    Subtítulos
    English

    Acerca del Curso

    Este curso es para usted si está interesado en la transición hacia un papel o cargo directivo en la seguridad cibernética y movilidad. A través de entrevistas con expertos de la industria en esta área, usted será capaz de analizar las innovaciones que impulsan la rápida difusión de la tecnología de la información y cómo éstos presentan nuevos retos para la protección de datos. Por ejemplo, los dispositivos móviles aumentan la comodidad y conveniencia en el uso, pero a menudo pasan por alto las tradiconales medidas de seguridad. Al finalizar este curso, usted será capaz de describir cómo la naturaleza de la amenaza evoluciona, como los programadores irresponsables emplean un conjunto creciente de herramientas sofisticadas para tomar ventaja de nuestra creciente dependencia de las redes de intercambio de datos críticos. Si desea seguir una carrera en el sector público, las perspectivas son y altas también. La proliferación de los hackers, errores humanos inevitables, las iniciativas de "traiga su propio dispositivo, como sus siglas en inglés (BYOD), y la cada vez más amplia necesidad de compartir información tienen un gran peso en las organizaciones gubernamentales y educativas, los cuales consumen recursos sustanciales. El Pentágono, por ejemplo, ha propuesto invertir $ 23 de millones de dólares en iniciativas de seguridad de la red hasta el año 2018. Esto puede parecer una gran inversión, pero se debe de tomar en cuenta el alcance y la importancia de los recursos de información que debe proteger el gobierno de Estados Unidos debe proteger. Después de finalizar los módulos del curso será capaz de explicar cómo las estrategias de prevención utilizadas anteriormente ya no son lo suficientemente eficaces para detener los sofisticados ataques dirigidos. La efectiva seguridad cibernética debe ser multi-dimensional y escalonada, ya que las amenazas pueden originarse desde prácticamente cualquier lugar del mundo, tener como objetivo cualquier nivel de una organización, y a veces persistir durante meses o años antes de que un personal de seguridad de la información pueda detectar un ataque o violación cibernética. Por lo tanto la seguridad en las redes requiere de un enfoque integral que incorpore varios elementos.
  2. CURSO 2

    Cybersecurity and the Internet of Things

    Próxima sesión: mar. 27 — may. 1.
    Dedicación
    4 weeks of study, 2-3 hours/week
    Subtítulos
    English

    Acerca del Curso

    Welcome! You may have heard about the Internet of Things (IoT). But you may also have wondered about what it is. Or for that matter, what does it mean to you or an organization. This course is for you if you are curious about the most recent trends and activities in the internet capabilities and concerns about programmed devices. There are complexities and areas of necessary awareness when the industrial sector becomes connected to your home. Security policies and practices have not yet caught up to the internet capabilities of some of our most common products. The “connected home”, “consumer wearables”, or even an employee’s HVAC system may cause an unanticipated threat to your business environment. You will explore current security and privacy related concerns in each of these areas. Every module will include readings, videos, case studies, and a quiz to help make sure you understand the material and concepts we talk about. This course offers a place to learn, reflect, and plan for a smart community approach to IoT. Portions of this course may seem extremely technical in nature. That is because the “things” in IoT represents engineering. Try to grasp the concept in that case.
  3. CURSO 3

    Cybersecurity and the X-Factor

    Sesión actual: mar. 20 — abr. 24.
    Dedicación
    4 weeks of study, 3-4 hours/week
    Subtítulos
    English

    Acerca del Curso

    What is the X-Factor? In Cybersecurity, the X-Factor related to unknown and unpredictable human behavior within and outside of your organization. “No one really knows why humans do what they do”, (David K. Reynolds), and because of this organizations can be unprepared for malicious, untrained, or even best intentioned behavior that can cause alarm and sometimes irreparable harm. This course will introduce you to the types of training available to reduce the impact of the X-Factor, evaluate its effectiveness, explore the Security Education, Training and Awareness (SETA) program, and learn why it may fail. The course will conclude with information designed to assist you with some critical components for your business security program. Activities focused on hactivism, cyberinsurance, and ransomware will round out your knowledge base. Your team of instructors has prepared a series of readings, discussions, guest lectures, and quizzes to engage you in this exciting topic.
  4. CURSO 4

    The Business of Cybersecurity Capstone

    Próxima sesión: may. 22 — jul. 10.
    Subtítulos
    English

    Sobre el Proyecto Final

    This course intends to make the student familiar with information security management. When you have finished with this course you will know more about: • Governance: including the mission, roles and responsibilities of the InfoSec governance function, and the strategic planning process and InfoSec’s role in the organization’s strategic planning effort. • You will understand the various types of InfoSec policies and how effective information security policy is created and used. • Risk management and the risk management process • Certain laws and ethical issues impacting information security in the organization. And some common information security management practices such as benchmarking and performance measures.

Creadores

  • Sistema Universitario de Georgia

    Kennesaw State University is a national leader in information security education and home of the Southeast regional cyberdefense competition. The NSA recognized the information security program as a center of academic excellence for security education. The NSA and Department of Homeland Security designated KSU a National Center of Academic Excellence in Information Assurance/Cyber Defense Education with focus in Security Policy Development and Compliance and Systems Security Administration.

    The University System of Georgia is composed of 28 higher education institutions including 4 research universities, 2 regional universities, 12 state universities, 13 state colleges and the Skidaway Institute of Oceanography. The Georgia Public Library System, encompassing 61 library systems throughout Georgia, is also part of the University System.

  • Dr. Traci Carte

    Dr. Traci Carte

    Associate Professor Chair, Information Systems
  • Herbert J. Mattord, Ph.D., CISM, CISSP, CDP

    Herbert J. Mattord, Ph.D., CISM, CISSP, CDP

    Associate Professor in Information Security and Assurance
  • Michael Whitman, Ph.D., CISM, CISSP

    Michael Whitman, Ph.D., CISM, CISSP

    Professor of Information Security
  • Dr. Humayun Zafar

    Dr. Humayun Zafar

    Associate Professor of Information Security and Assurance
  • Mr. Andy Green

    Mr. Andy Green

    Lecturer of Information Security and Assurance

FAQs

More questions? Visit the Learner Help Center.