Coursera
Coursera Logo

University of Maryland - Cybersecurity for Everyone 

  • Offered byCoursera

Cybersecurity for Everyone
 at 
Coursera 
Overview

Duration

22 hours

Start from

Start Now

Total fee

Free

Mode of learning

Online

Difficulty level

Beginner

Official Website

Explore Free Course External Link Icon

Credential

Certificate

Cybersecurity for Everyone
 at 
Coursera 
Highlights

  • Reset deadlines in accordance to your schedule.
  • Shareable Certificate
  • Earn a Certificate upon completion
  • 100% online Start instantly and learn at your own schedule.
Read more
Details Icon

Cybersecurity for Everyone
 at 
Coursera 
Course details

More about this course
  • Your instructor, Dr. Charles Harry, has served on the front lines with the NSA (National Security Agency) and as an expert advising corporate and institutional leaders on managing cybersecurity risk.
  • And he brings a rare and engaging perspective to help you learn cybersecurity from the ground up.
  • Cybersecurity for Everyone lays the groundwork to understand and explore the key issues facing policy makers attempting to manage the problem of cybersecurity, from its technical foundations to the domestic and international policy considerations surrounding governance, privacy, and risk management, to applications for achieving the goals of an enterprise, an institution, or a nation.

Cybersecurity for Everyone
 at 
Coursera 
Curriculum

Cybersecurity for Everyone: Defining Cyber, Security, and Cybersecurity Policy (Week 1)

Foundations: An Introduction

What is Cyber?

What is Security?

Demystifying the Cybersecurity Problem

The Threat Landscape

Threat Landscape Challenge

Examples of Cyber Incidence

Practical Questions

Optional Reading: Harry, C & Gallagher, N ? Classifying Cyber Events: A Proposed Taxonomy?

National Research Council, ?At the Nexus of Cybersecurity and Public Policy?, Ch. 1

Avast, 2020 Threat Landscape Report

James R. Clapper, Worldwide Threat Assessment of the US Intelligence Community (Feb. 2015) ? pp. 1-4

Week 1 Quiz

Cybersecurity for Everyone: Evolution of the Internet (Week 2)

Academic Inspiration and a World Changing Idea

Government Support and Prototyping

Private Sector Support and Moving the Internet Out of the Lab

Privatizing and Scaling the Internet

Building the World Wide Web

The Internet as a Global Commons

Leiner, Cerf, et. al., A Brief History of the Internet ? pp. 1-9

Week 2 Quiz

Cybersecurity for Everyone: Global Telecommunications Architecture and Governance (Week 3)

How Data Moves: Encapsulation

How Data Moves: Application Layer

How Data Moves: Network Layer

How Data Moves: Physical Layer

What is Governance?

Governing the Internet

Vangie Beal ?The 7 layers of the OSI Model?, Webopedia

Joseph S. Nye, Jr. ?The Regime Complex for Managing Global Cyber Activities?, Global Commission on Internet Governance? 2014

Assante & Bochman ?IoT, Automation, Autonomy, and Megacities in 2025: A Dark Preview?, Center for Strategic & International Studies, April 2017

Fischer, ?The Internet of Things: Frequently Asked Questions? Congressional Research Service, Oct 2015

Week 3 Quiz

Cybersecurity for Everyone: Threat Actors and Their Motivations (Week 4)

Threat Actors: Who Are the Hackers?

Threat Actors: Hobbyists

Threat Actors: Criminal Organizations

Cyber Crime Case Study: The San Francisco Muni Attack

Threat Actors: Hacktivists

Threat Actors: Advanced Persistent Threats

Cybersecurity Threats Impacting the Nation

Fire Eye, ?APT28 Cybergroup Activity?

Lillian Ablon, Martin C. Libicki, Andrea A. Golay, Markets for cybercrime tools and stolen data, RAND Corporation

Week 4 Quiz

Cybersecurity for Everyone: The Hacking Process (Week 5)

Hacking As a Process

Reconnaissance

Weaponization

Delivery

Exploitation and Installation

Command and Control

Effects

Lockheed Martin Cyber Kill chain

MITRE ATT&CK Framework

Boebert, W. Earl, ?A Survey of Challenges in Attribution,? in National Research Council, Proceedings of a Workshop on Deterring Cyberattacks, 2010, pp. 41-52.

Week 5 Quiz

Cybersecurity for Everyone: End Effects - Direct and Indirect Consequences (Week 6)

Framing Effects

Primary Effects

Secondary Effects

Second Level Effects

A Strategic Approach to Cybersecurity

Harry, C & Gallagher, N ? Classifying Cyber Events: A Proposed Taxonomy? , CISSM

Week 6 Quiz

Cybersecurity for Everyone
 at 
Coursera 
Admission Process

    Important Dates

    May 25, 2024
    Course Commencement Date

    Other courses offered by Coursera

    – / –
    3 months
    Beginner
    – / –
    20 hours
    Beginner
    – / –
    2 months
    Beginner
    – / –
    3 months
    Beginner
    View Other 6715 CoursesRight Arrow Icon
    qna

    Cybersecurity for Everyone
     at 
    Coursera 

    Student Forum

    chatAnything you would want to ask experts?
    Write here...