About this 전문분야
최근 조회 3,739

100% 온라인 강좌

지금 바로 시작해 나만의 일정에 따라 학습을 진행하세요.

유동적 일정

유연한 마감을 설정하고 유지 관리합니다.

초급 단계

완료하는 데 약 4개월 필요

매주 3시간 권장

영어

자막: 영어

귀하가 습득할 기술

RansomwareCybersecurityInternet Of Things (IOT)Mobile Security

100% 온라인 강좌

지금 바로 시작해 나만의 일정에 따라 학습을 진행하세요.

유동적 일정

유연한 마감을 설정하고 유지 관리합니다.

초급 단계

완료하는 데 약 4개월 필요

매주 3시간 권장

영어

자막: 영어

How the 전문분야 Works

강좌 수강

Coursera 전문 분야는 기술을 완벽하게 습득하는 데 도움이 되는 일련의 강좌입니다. 시작하려면 전문 분야에 직접 등록하거나 강좌를 둘러보고 원하는 강좌를 선택하세요. 하나의 전문 분야에 속하는 강좌에 등록하면 해당 전문 분야 전체에 자동으로 등록됩니다. 단 하나의 강좌만 수료해도 됩니다. — 학습을 일시 중지하거나 언제든 구독을 종료할 수 있습니다. 학습자 대시보드를 방문하여 강좌 등록 상태와 진도를 추적해 보세요.

실습 프로젝트

모든 전문 분야에는 실습 프로젝트가 포함되어 있습니다. 전문 분야를 완료하고 수료증을 받으려면 프로젝트를 성공적으로 마쳐야 합니다. 전문 분야에 별도의 실습 프로젝트 강좌가 포함되어 있는 경우 각 강좌를 완료해야 프로젝트를 시작할 수 있습니다.

수료증 취득

모든 강좌를 마치고 실습 프로젝트를 완료하면 취업할 때나 전문가 네트워크에 진입할 때 제시할 수 있는 수료증을 취득할 수 있습니다.

how it works

이 전문분야에는 4개의 강좌가 있습니다.

강좌1

Cybersecurity and Mobility

4.4
281개의 평가
56개의 리뷰

This course is for you if you are interested in transitioning toward a managerial role in cybersecurity and mobility. Through interviews with industry experts in this area, you will be able to analyze innovations powering the rapid spread of information technology and how they present new challenges for protecting data. For example, mobile devices increase convenience but often bypass traditional security measures. After this course, you will be able to describe how the nature of the threat evolves, as culprits employ a burgeoning set of sophisticated tools to take advantage of our growing reliance on networks for critical-data exchange. If you want to pursue a career in the public sector, the stakes are high as well. The proliferation of hackers, inevitable human errors, bring-your-own-device (BYOD) initiatives, and the ever-broadening need to share information weigh heavily on government and education organizations, and consume substantial resources. The Pentagon, for example, has proposed to spend $23 billion on network security initiatives through 2018. This sounds like a large sum, until you consider the scope and importance of the U.S. government information resources this investment must protect. After completing the course modules you will be able to explain how yesterday’s prevention strategies are no longer adequate for stopping advanced, targeted attacks. Effective cybersecurity must be multi-dimensional and tiered, as threats can originate from virtually anywhere, target numerous levels of an organization, and sometimes persist for months or years before an information security staff is aware of an attack or breach. Therefore securing networks requires a holistic approach that incorporates several elements.

...
강좌2

Cybersecurity and the Internet of Things

4.4
269개의 평가
70개의 리뷰

Welcome! You may have heard about the Internet of Things (IoT). But you may also have wondered about what it is. Or for that matter, what does it mean to you or an organization. This course is for you if you are curious about the most recent trends and activities in the internet capabilities and concerns about programmed devices. There are complexities and areas of necessary awareness when the industrial sector becomes connected to your home. Security policies and practices have not yet caught up to the internet capabilities of some of our most common products. The “connected home”, “consumer wearables”, or even an employee’s HVAC system may cause an unanticipated threat to your business environment. You will explore current security and privacy related concerns in each of these areas. Every module will include readings, videos, case studies, and a quiz to help make sure you understand the material and concepts we talk about. This course offers a place to learn, reflect, and plan for a smart community approach to IoT. Portions of this course may seem extremely technical in nature. That is because the “things” in IoT represents engineering. Try to grasp the concept in that case.

...
강좌3

Cybersecurity and the X-Factor

4.6
93개의 평가
23개의 리뷰

What is the X-Factor? In Cybersecurity, the X-Factor related to unknown and unpredictable human behavior within and outside of your organization. “No one really knows why humans do what they do”, (David K. Reynolds), and because of this organizations can be unprepared for malicious, untrained, or even best intentioned behavior that can cause alarm and sometimes irreparable harm. This course will introduce you to the types of training available to reduce the impact of the X-Factor, evaluate its effectiveness, explore the Security Education, Training and Awareness (SETA) program, and learn why it may fail. The course will conclude with information designed to assist you with some critical components for your business security program. Activities focused on hactivism, cyberinsurance, and ransomware will round out your knowledge base. Your team of instructors has prepared a series of readings, discussions, guest lectures, and quizzes to engage you in this exciting topic.

...
강좌4

The Business of Cybersecurity Capstone

4.8
27개의 평가
11개의 리뷰

This course intends to make the student familiar with information security management. When you have finished with this course you will know more about: • Governance: including the mission, roles and responsibilities of the InfoSec governance function, and the strategic planning process and InfoSec’s role in the organization’s strategic planning effort. • You will understand the various types of InfoSec policies and how effective information security policy is created and used. • Risk management and the risk management process • Certain laws and ethical issues impacting information security in the organization. And some common information security management practices such as benchmarking and performance measures.

...

강사

Avatar

Michael Whitman, Ph.D., CISM, CISSP

Professor of Information Security
Information Systems
Avatar

Mr. Andy Green

Lecturer of Information Security and Assurance
Kennesaw State University - Department of Information Systems
Avatar

Dr. Humayun Zafar

Associate Professor of Information Security and Assurance
Information Systems
Avatar

Herbert J. Mattord, Ph.D., CISM, CISSP, CDP

Associate Professor in Information Security and Assurance
Information Systems
Avatar

Dr. Traci Carte

Associate Professor Chair, Information Systems
Information Systems

조지아주립대 시스템 정보

The University System of Georgia is composed of 28 higher education institutions including 4 research universities, 2 regional universities, 12 state universities, 13 state colleges and the Skidaway Institute of Oceanography. The Georgia Public Library System, encompassing 61 library systems throughout Georgia, is also part of the University System....

자주 묻는 질문

  • 네! 시작하려면 관심 있는 강좌 카드를 클릭하여 등록합니다. 강좌를 등록하고 완료하면 공유할 수 있는 인증서를 얻거나 강좌를 청강하여 강좌 자료를 무료로 볼 수 있습니다. 전문 분야 과정에 있는 강좌에 등록하면, 전체 전문 분야에 등록하게 됩니다. 학습자 대시보드에서 진행 사항을 추적할 수 있습니다.

  • 이 강좌는 100% 온라인으로 진행되므로 강의실에 직접 참석할 필요가 없습니다. 웹 또는 모바일 장치를 통해 언제 어디서든 강의, 읽기 자료, 과제에 접근할 수 있습니다.

  • There are three courses and one capstone course. Each course will last approximately 4 to 5 weeks. The capstone is expected to take 5 to 6 weeks to complete.

  • This Specialization covers the fundamentals of cybersecurity in the organization at a beginners level. It is beginners level because no prior experience or courses in Information Systems, Information security and Assurance, Cybersecurity, or Information Technology are necessary. However, it is a college-level course in which learners are expected to critically analyze the subject matter and apply it to their workplace scenarios.

  • We highly recommend taking the courses in order as each course builds on elements learned in the previous course. However each course may also act as stand-alone and you are welcome to register for each individually if you have previous learning experience in that subject area.

  • Currently this course offers no college credit, but this is subject to change.

  • This specialization will help the learner understand the ever-changing field of cybersecurity and its impact on the business environment. Learners will begin this specialization by learning current trends in mobile technology and how organizational policy is critical to maintain information security. Next, learners will be introduced to devices that support computer-to-computer interaction and how these devices can become "soft entry" points for hackers. The third course illustrates the "X-Factor" or the human influence in technology. Finally, learners will consider best practices in order for organizations to secure their networks. In terms of careers, future managers and leaders will need to learn about cybersecurity and the risk environment that results. This specialization will better position learners to enter into jobs that require strategic thought, organizational planning, and risk impact analysis. Cybersecurity is often overlooked in these areas. The specialization will prepare you to address those future needs and support your organization in cybersecurity awareness and risk mitigation.

궁금한 점이 더 있으신가요? 학습자 도움말 센터를 방문해 보세요.