This course is designed to introduce students, working professionals and the community to the exciting field of cybersecurity. Throughout the MOOC, participants will engage in community discourse and online interaction. Participants will gain knowledge and understanding of cybersecurity and its domains. They will engage with expertly produced videos, gain insight from industry experts, participate in knowledge assessments, practice assessing their environmental awareness, and gain access to materials that address governance and risk management, compliance, business continuity and disaster recovery, cryptography, software development security, access control, network security, security architecture, security operations, and physical and environmental security. Learning will be assessed using strategies aligned to knowledge and understanding.
Cybersecurity and Its Ten Domains
Instructor: Dr. Humayun Zafar, CEH, CISM, CRISC, PCIP
Sponsored by HKUST
180,278 already enrolled
(2,398 reviews)
Skills you'll gain
- Information Systems Security
- Cyber Security Strategy
- Cyber Security Policies
- Security Software
- Cyber Risk
- IT Security Architecture
- Information Technology
- Security Engineering
- Enterprise Security
- Network Security
- IT Infrastructure
- Security Controls
- Cyber Governance
- Cybersecurity
- Application Security
- Infrastructure Security
- Information Technology Architecture
- Security Management
- Information Systems
- Business Continuity
Details to know
Add to your LinkedIn profile
7 assignments
See how employees at top companies are mastering in-demand skills
Earn a career certificate
Add this credential to your LinkedIn profile, resume, or CV
Share it on social media and in your performance review
There are 7 modules in this course
Checkout our marquee speaker. She's the Chief Privacy Officer at Coca Cola.
What's included
2 videos4 readings1 assignment
In this module we cover some of the fundamentals of security that will assist you throughout the course. We will then introduce you to two domains of cyber security: access control and software development security. Focus will be on areas such as confidentiality, integrity, and availability, as well secure software development techniques.
What's included
4 videos1 reading1 assignment1 peer review
In this module we are going to delve a little deeper into cyber security by covering business continuity and disaster recovery planning and cryptography. Learners will be exposed to what a disruptive event is and how the federal government through agencies such as FEMA handles disasters. We will also covers encryption and decryption and the various techniques used.
What's included
3 videos1 reading1 assignment
In this module we are going to cover some of the non-technical topics associated to cyber security: Information security governance and risk management and legal, regulations, investigations, and compliance. It is important to realize, that non-technical does not mean easy, or not important. In fact, I would like to argue that they are more important that the technical side of cyber security.
What's included
3 videos1 reading1 assignment
In this module we are going to cover what amount to some of the more intuitive parts of cybersecurity: operations security and physical and environmental security. Learners will understand operations security from a competitor/enemy/hacker’s viewpoint and then develop and apply countermeasures accordingly. Learners will also be exposed to electric power issues such as brownouts, fire detection and suppression, and HVAC.
What's included
3 videos1 reading1 assignment
In this module we are going to cover some of the most technical and comprehensive topics that cyber security has to offer as we look at Security Architecture and Design and Telecommunications and Network Security. Learners will be exposed to security models such as Bell LaPadula, Clark-Wilson, Mandatory Access Control (MAC), Discretionary Access Control (DAC), Role-Based Access Control (RBAC), and Access Matrix. We will also describe the Open Systems Interconnect (OSI) model and its seven layers.
What's included
3 videos2 readings2 assignments
In this module we provide details about leveraging this MOOC for credit at the undergraduate level at Kennesaw State University. It is very important that learners follow directions carefully.
What's included
1 reading
Instructor
Offered by
Why people choose Coursera for their career
Learner reviews
2,398 reviews
- 5 stars
63.12%
- 4 stars
21.31%
- 3 stars
7.71%
- 2 stars
3.37%
- 1 star
4.46%
Showing 3 of 2398
Reviewed on Jan 26, 2020
Brilliant overview and indepth presentation of topics and subject matter. I have been truly impressed and really enjoyed every minutes spent studying this course. Thank you.
Reviewed on Sep 2, 2015
This is quite a good course. However it's pretty basic and if you are trying to dig deep into Cybersecurity I suggest taking the Cybersecurity specialization.
Reviewed on May 31, 2020
A nice and knowledge gaining course. It was fun and interesting to learn our domain interest courses at our own phase was so luxurious and interesting to learn.
Recommended if you're interested in Computer Science
Packt
University of Colorado Boulder
Open new doors with Coursera Plus
Unlimited access to 10,000+ world-class courses, hands-on projects, and job-ready certificate programs - all included in your subscription
Advance your career with an online degree
Earn a degree from world-class universities - 100% online
Join over 3,400 global companies that choose Coursera for Business
Upskill your employees to excel in the digital economy