This course is designed to introduce students, working professionals and the community to the exciting field of cybersecurity. Throughout the MOOC, participants will engage in community discourse and online interaction. Participants will gain knowledge and understanding of cybersecurity and its domains. They will engage with expertly produced videos, gain insight from industry experts, participate in knowledge assessments, practice assessing their environmental awareness, and gain access to materials that address governance and risk management, compliance, business continuity and disaster recovery, cryptography, software development security, access control, network security, security architecture, security operations, and physical and environmental security. Learning will be assessed using strategies aligned to knowledge and understanding.

Cybersecurity and Its Ten Domains

Cybersecurity and Its Ten Domains

Instructor: Dr. Humayun Zafar, CEH, CISM, CRISC, PCIP
Access provided by FutureX
181,650 already enrolled
2,412 reviews
Skills you'll gain
- Cryptography
- Disaster Recovery
- Identity and Access Management
- Governance
- Security Controls
- Cybersecurity
- IT Security Architecture
- Risk Management
- Safety and Security
- Secure Coding
- Application Security
- Infrastructure Security
- Law, Regulation, and Compliance
- Network Security
- Systems Development Life Cycle
- Business Continuity
- Skills section collapsed. Showing 10 of 16 skills.
Details to know

Add to your LinkedIn profile
See how employees at top companies are mastering in-demand skills

There are 7 modules in this course
Checkout our marquee speaker. She's the Chief Privacy Officer at Coca Cola.
What's included
2 videos4 readings1 assignment
In this module we cover some of the fundamentals of security that will assist you throughout the course. We will then introduce you to two domains of cyber security: access control and software development security. Focus will be on areas such as confidentiality, integrity, and availability, as well secure software development techniques.
What's included
4 videos1 reading1 assignment1 peer review
In this module we are going to delve a little deeper into cyber security by covering business continuity and disaster recovery planning and cryptography. Learners will be exposed to what a disruptive event is and how the federal government through agencies such as FEMA handles disasters. We will also covers encryption and decryption and the various techniques used.
What's included
3 videos1 reading1 assignment
In this module we are going to cover some of the non-technical topics associated to cyber security: Information security governance and risk management and legal, regulations, investigations, and compliance. It is important to realize, that non-technical does not mean easy, or not important. In fact, I would like to argue that they are more important that the technical side of cyber security.
What's included
3 videos1 reading1 assignment
In this module we are going to cover what amount to some of the more intuitive parts of cybersecurity: operations security and physical and environmental security. Learners will understand operations security from a competitor/enemy/hacker’s viewpoint and then develop and apply countermeasures accordingly. Learners will also be exposed to electric power issues such as brownouts, fire detection and suppression, and HVAC.
What's included
3 videos1 reading1 assignment
In this module we are going to cover some of the most technical and comprehensive topics that cyber security has to offer as we look at Security Architecture and Design and Telecommunications and Network Security. Learners will be exposed to security models such as Bell LaPadula, Clark-Wilson, Mandatory Access Control (MAC), Discretionary Access Control (DAC), Role-Based Access Control (RBAC), and Access Matrix. We will also describe the Open Systems Interconnect (OSI) model and its seven layers.
What's included
3 videos2 readings2 assignments
In this module we provide details about leveraging this MOOC for credit at the undergraduate level at Kennesaw State University. It is very important that learners follow directions carefully.
What's included
1 reading
Instructor

Offered by
Why people choose Coursera for their career

Felipe M.

Jennifer J.

Larry W.

Chaitanya A.
Learner reviews
- 5 stars
63.16%
- 4 stars
21.23%
- 3 stars
7.75%
- 2 stars
3.40%
- 1 star
4.43%
Showing 3 of 2412
Reviewed on May 31, 2020
A nice and knowledge gaining course. It was fun and interesting to learn our domain interest courses at our own phase was so luxurious and interesting to learn.
Reviewed on Oct 16, 2019
The best place to start your foundation in cybersecurity in improving your ability over your peers and this course is the right course you would ever come across.
Reviewed on Sep 2, 2015
This is quite a good course. However it's pretty basic and if you are trying to dig deep into Cybersecurity I suggest taking the Cybersecurity specialization.
Explore more from Computer Science

Kennesaw State University

Kennesaw State University

Kennesaw State University

Kennesaw State University
¹ Some assignments in this course are AI-graded. For these assignments, your data will be used in accordance with Coursera's Privacy Notice.

