University of Maryland - Cybersecurity for Everyone
- Offered byCoursera
Cybersecurity for Everyone at Coursera Overview
Duration | 22 hours |
Start from | Start Now |
Total fee | Free |
Mode of learning | Online |
Difficulty level | Beginner |
Official Website | Explore Free Course |
Credential | Certificate |
Cybersecurity for Everyone at Coursera Highlights
- Reset deadlines in accordance to your schedule.
- Shareable Certificate
- Earn a Certificate upon completion
- 100% online Start instantly and learn at your own schedule.
Cybersecurity for Everyone at Coursera Course details
- Your instructor, Dr. Charles Harry, has served on the front lines with the NSA (National Security Agency) and as an expert advising corporate and institutional leaders on managing cybersecurity risk.
- And he brings a rare and engaging perspective to help you learn cybersecurity from the ground up.
- Cybersecurity for Everyone lays the groundwork to understand and explore the key issues facing policy makers attempting to manage the problem of cybersecurity, from its technical foundations to the domestic and international policy considerations surrounding governance, privacy, and risk management, to applications for achieving the goals of an enterprise, an institution, or a nation.
Cybersecurity for Everyone at Coursera Curriculum
Cybersecurity for Everyone: Defining Cyber, Security, and Cybersecurity Policy (Week 1)
Foundations: An Introduction
What is Cyber?
What is Security?
Demystifying the Cybersecurity Problem
The Threat Landscape
Threat Landscape Challenge
Examples of Cyber Incidence
Practical Questions
Optional Reading: Harry, C & Gallagher, N ? Classifying Cyber Events: A Proposed Taxonomy?
National Research Council, ?At the Nexus of Cybersecurity and Public Policy?, Ch. 1
Avast, 2020 Threat Landscape Report
James R. Clapper, Worldwide Threat Assessment of the US Intelligence Community (Feb. 2015) ? pp. 1-4
Week 1 Quiz
Cybersecurity for Everyone: Evolution of the Internet (Week 2)
Academic Inspiration and a World Changing Idea
Government Support and Prototyping
Private Sector Support and Moving the Internet Out of the Lab
Privatizing and Scaling the Internet
Building the World Wide Web
The Internet as a Global Commons
Leiner, Cerf, et. al., A Brief History of the Internet ? pp. 1-9
Week 2 Quiz
Cybersecurity for Everyone: Global Telecommunications Architecture and Governance (Week 3)
How Data Moves: Encapsulation
How Data Moves: Application Layer
How Data Moves: Network Layer
How Data Moves: Physical Layer
What is Governance?
Governing the Internet
Vangie Beal ?The 7 layers of the OSI Model?, Webopedia
Joseph S. Nye, Jr. ?The Regime Complex for Managing Global Cyber Activities?, Global Commission on Internet Governance? 2014
Assante & Bochman ?IoT, Automation, Autonomy, and Megacities in 2025: A Dark Preview?, Center for Strategic & International Studies, April 2017
Fischer, ?The Internet of Things: Frequently Asked Questions? Congressional Research Service, Oct 2015
Week 3 Quiz
Cybersecurity for Everyone: Threat Actors and Their Motivations (Week 4)
Threat Actors: Who Are the Hackers?
Threat Actors: Hobbyists
Threat Actors: Criminal Organizations
Cyber Crime Case Study: The San Francisco Muni Attack
Threat Actors: Hacktivists
Threat Actors: Advanced Persistent Threats
Cybersecurity Threats Impacting the Nation
Fire Eye, ?APT28 Cybergroup Activity?
Lillian Ablon, Martin C. Libicki, Andrea A. Golay, Markets for cybercrime tools and stolen data, RAND Corporation
Week 4 Quiz
Cybersecurity for Everyone: The Hacking Process (Week 5)
Hacking As a Process
Reconnaissance
Weaponization
Delivery
Exploitation and Installation
Command and Control
Effects
Lockheed Martin Cyber Kill chain
MITRE ATT&CK Framework
Boebert, W. Earl, ?A Survey of Challenges in Attribution,? in National Research Council, Proceedings of a Workshop on Deterring Cyberattacks, 2010, pp. 41-52.
Week 5 Quiz
Cybersecurity for Everyone: End Effects - Direct and Indirect Consequences (Week 6)
Framing Effects
Primary Effects
Secondary Effects
Second Level Effects
A Strategic Approach to Cybersecurity
Harry, C & Gallagher, N ? Classifying Cyber Events: A Proposed Taxonomy? , CISSM
Week 6 Quiz