Cybersecurity and Its Ten Domains

Coursera
Course Summary
Learn about the ten domains of cybersecurity through the lens of subject area experts from companies such as Coca Cola, SAP, and Macy's.
-
+
Course Description
This course is designed to introduce students, working professionals and the community to the exciting field of cybersecurity. Throughout the MOOC, participants will engage in community discourse and online interaction. They will engage with expertly produced videos, gain insight from industry experts, participate in knowledge assessments, practice assessing their environmental awareness, and gain access to materials that address governance and risk management, compliance, business continuity and disaster recovery, cryptography, software development security, access control, network security, security architecture, security operations, and physical and environmental security. Learning will be assessed using strategies aligned to knowledge and understanding.
Society, and more specifically today's business environment, is information driven. The degree to which businesses and the people in them rely on such information, the quantity and nature of that information and the rate of change in the technology used to process the information makes the information security situation overwhelming to the unprepared. The potential risks to businesses are vast, and most organizations today are faced with significant challenges in the governance, risk management and compliance requirements being demanded by their management. Local, state, and federal government employers, along with public and private organizations need highly proficient information security professionals trained to use managerial and technological solutions to mitigate risks associated with modern information usage. Potential employers are looking for qualified applications to meet the growing demand for graduates in the discipline of information security. These needs are particularly critical and projected to grow in the US.
-
+
Course Syllabus
Module One: Introduction to Security, Access Control, and Software Development Security.
Module Two: Business Continuity and Disaster Recovery Planning, and Cryptography.
Module Three: Information Security Governance and Risk Management, and Legal, Regulations, Investigations, and Compliance.
Module Four: Operations Security, and Physical and Environmental Security.
Module Five: Security Architecture and Design, and Telecommunications and Network Security.
Module Six: Next Steps and Beyond
Note: Each module is scheduled to last a week. Each module also has a peer-assessed discussion assignment along with a machine graded quiz. -
+
Recommended Background
No background required; all are welcome!!
-
+
Course Format
The class will consist of lecture videos, all of which are less than 4 minutes long. Supplementary reading materials are also presented. Each module will have multiple videos, as well as a machine-graded quiz. Peer-assessed discussions are also required.
-
+
Suggested Reading
All readings (required and optional) that are a part of this course are open and free. The links to those are provided in each module.