This course is designed for Enterprise IT Leaders, Cybersecurity Professionals, and Cloud Service Providers. This final course in the series looks at edge security from a strategic perspective. By the end of this course, learners will be able to explain the impact of edge computing breaches, identify edge computing risk identification methodologies, estimate cyber-attack probability with threat data and trends, prioritize potential risks specific to edge computing environments, develop risk mitigation strategies, list real-time monitoring and incident response solutions, list options involved with harmonizing edge computing standards across different regions and industries, and more.
Strategic Edge Security Management
This course is part of Security at the Edge Specialization
Instructor: Vahab Iranmanesh
Sponsored by BrightStar Care
Recommended experience
Details to know
Add to your LinkedIn profile
12 assignments
See how employees at top companies are mastering in-demand skills
Build your subject-matter expertise
- Learn new concepts from industry experts
- Gain a foundational understanding of a subject or tool
- Develop job-relevant skills with hands-on projects
- Earn a shareable career certificate
Earn a career certificate
Add this credential to your LinkedIn profile, resume, or CV
Share it on social media and in your performance review
There are 3 modules in this course
During this module, we will focus on understanding the consequences and implications of edge computing breaches, providing insights into various aspects of risk assessment, cyber-attack probability estimation, and evaluating the aftermath of cyber incidents on organizations.
What's included
5 videos6 readings4 assignments1 plugin
During this module, we will develop risk mitigation strategies tailored to the unique challenges of edge computing environments and effectively implement continuous improvement and measurement practices to enhance edge security and resilience.
What's included
4 videos3 readings4 assignments1 discussion prompt2 plugins
During this module, we will explore the complex world of international standards in edge computing and the challenges of maintaining compliance in a swiftly changing environment.
What's included
4 videos2 readings4 assignments1 discussion prompt1 plugin
Instructor
Offered by
Why people choose Coursera for their career
Recommended if you're interested in Information Technology
University of Colorado System
Board Infinity
Palo Alto Networks
Open new doors with Coursera Plus
Unlimited access to 10,000+ world-class courses, hands-on projects, and job-ready certificate programs - all included in your subscription
Advance your career with an online degree
Earn a degree from world-class universities - 100% online
Join over 3,400 global companies that choose Coursera for Business
Upskill your employees to excel in the digital economy