University of Colorado Boulder - Cybersecurity Policy for Water and Electricity Infrastructures
- Offered byCoursera
Cybersecurity Policy for Water and Electricity Infrastructures at Coursera Overview
Duration | 9 hours |
Start from | Start Now |
Total fee | Free |
Mode of learning | Online |
Difficulty level | Beginner |
Official Website | Explore Free Course |
Credential | Certificate |
Cybersecurity Policy for Water and Electricity Infrastructures at Coursera Highlights
- This Course Plus the Full Specialization.
- Shareable Certificates.
- Graded Programming Assignments.
Cybersecurity Policy for Water and Electricity Infrastructures at Coursera Course details
- This course will examine the drinking water and electricity infrastructures, and various policies that have been developed to help guide and strengthen their cybersecurity programs. The drinking water and electricity infrastructures are two of fourteen subsectors comprising what are known as "lifeline infrastructure". The 2013 National Infrastructure Protection Plan identifies four lifeline infrastructure sectors: 1) water, 2) energy, 3) transportation, and 4) communications. These sectors are designated "lifeline" because many other infrastructures depend upon them. The drinking water subsector is part of the water sector, and the electricity subsector is part of the energy sector. Both subsectors are overseen by the Department of Homeland Security National Protection and Programs Directorate which manages the DHS National Infrastructure Protection Program. The NIPP employs a five-step continuous improvement program called the Risk Management Framework. NIPP implementation is overseen by DHS-designated Sector-Specific Agencies staffed by various Federal departments. The Sector-Specific Agencies work in voluntary cooperation with industry representatives to apply the Risk Management Framework and document results in corresponding Sector-Specific Plans. The program began in 2007 and the most recent Sector-Specific Plans were published in 2016. In February 2013, President Obama issued Executive 13636 directing the National Institute of Standards and Technology to develop a voluntary set of recommendations for strengthening infrastructure cybersecurity measures. EO13636 also asked Federal agencies with regulating authority to make a recommendation whether the NIST Cybersecurity Framework should be made mandatory. The Environmental Protection Agency who is both the SSA and regulatory authority for the drinking water subsector recommended voluntary application of the NIST Cybersecurity Framework. The Department of Energy who is both the SSA and regulatory authority for the electricity subsector replied that it was already implementing the Electricity Subsector Cybersecurity Capability Maturity Model, which indeed was what the NIST Cybersecurity Framework was based on. The Department of Energy, though, recommended voluntary application of the ES-C2M2. This module will examine both the drinking water and electricity lifeline infrastructure subsectors, and elements and application of the NIST Cybersecurity Framework and ES-C2M2.
Cybersecurity Policy for Water and Electricity Infrastructures at Coursera Curriculum
Module 5: Water Infrastructure & NIST Cybersecurity Framework
Course 2 Introduction
L11 Water Infrastructure
L12 NIST Cybersecurity Framework
Water: International Perspective (Optional Video)
NIST Cybersecurity Framework (Optional)
More on NIST CSF (Optional Video)
L11 Challenge Questions
L12 Challenge Questions
Module 6: Applied NIST Cybersecurity Framework
L13 Applying NIST CSF (1)
L14 Applying NIST CSF (2)
L15 Applying NIST CSF (3)
L13 Challenge Questions
L14 Challenge Questions
L15 Challenge Questions
Exam 3
Module 7: Electricity Infrastructure & ES-C2M2
L16 Electricity Infrastructure
L17 Electricity Subsector Cybersecurity Capability Maturity Model
Protecting Electricity Infrastructure (Optional Video)
ES-C2M2 (Optional)
Electricity Cyber Risk Management (Optional Video)
L16 Challenge Questions
L17 Challenge Questions
Module 8: Applied ES-C2M2
L18 Applying ES-C2M2 (1)
L19 Applying ES-C2M2 (2)
L20 Applying ES-C2M2 (3)
L18 Challenge Questions
L19 Challenge Questions
L20 Challenge Questions
Exam 4
Starting a Cybersecurity Program