What is the X-Factor? In Cybersecurity, the X-Factor related to unknown and unpredictable human behavior within and outside of your organization. “No one really knows why humans do what they do”, (David K. Reynolds), and because of this organizations can be unprepared for malicious, untrained, or even best intentioned behavior that can cause alarm and sometimes irreparable harm.
Cybersecurity and the X-Factor
This course is part of Cybersecurity: Developing a Program for Your Business Specialization
Instructors: Dr. Humayun Zafar, CEH, CISM, CRISC, PCIP
Sponsored by Barbados NTI
18,562 already enrolled
(256 reviews)
Skills you'll gain
Details to know
Add to your LinkedIn profile
7 assignments
See how employees at top companies are mastering in-demand skills
Build your subject-matter expertise
- Learn new concepts from industry experts
- Gain a foundational understanding of a subject or tool
- Develop job-relevant skills with hands-on projects
- Earn a shareable career certificate
Earn a career certificate
Add this credential to your LinkedIn profile, resume, or CV
Share it on social media and in your performance review
There are 4 modules in this course
The X-factor within information security is human behavior within and outside your organization. Our introduction includes an overview of information security management and its goals as well as describing the problem created by non-malicious insider behavior. We include discussion about the purpose of training within organizational cybersecurity efforts and whether it is achieving its purpose.
What's included
4 videos6 readings1 assignment1 peer review1 discussion prompt
Within this topic we will discuss traditional training efforts. Security education, training and awareness (SETA) programs are designed to reduce the incidence of accidental security breaches. Through the readings you will learn about the design and delivery of these programs as well as various training techniques. This module concludes with a discussion about your experience and opinion about organizational security training.
What's included
4 videos4 readings2 assignments1 discussion prompt
In this module you will understand why traditional training efforts through SETA programs may fail. You will learn about human behavior and how understanding it can help managers better leverage their security efforts. Finally, through the readings you will also see that this is a global issue. The readings present examples of existing awareness campaigns in U.K., in Australia, in Canada and Africa.
What's included
4 videos5 readings2 assignments1 peer review1 discussion prompt
We will conclude by identifying some novel problems and practices that organizations are experiencing. You will learn about hactivism, cyberinsurance, and ransomware through popular press readings about recent security problems that landed companies on the front page.
What's included
3 videos6 readings2 assignments1 discussion prompt
Instructors
Offered by
Why people choose Coursera for their career
Learner reviews
256 reviews
- 5 stars
76.56%
- 4 stars
17.57%
- 3 stars
3.12%
- 2 stars
0.39%
- 1 star
2.34%
Showing 3 of 256
Reviewed on Jun 17, 2020
It is really great experience in learning this course. I have learned newly about the threat intelligence, employee habits and security breaches etc. Thank you.
Reviewed on May 20, 2020
The course gave an insight about how people become the front line of security defense.
Reviewed on Oct 19, 2020
It is a very enriched course with a lot of information on cyber security.
Recommended if you're interested in Computer Science
Kennesaw State University
University of Maryland, College Park
Infosec
Open new doors with Coursera Plus
Unlimited access to 10,000+ world-class courses, hands-on projects, and job-ready certificate programs - all included in your subscription
Advance your career with an online degree
Earn a degree from world-class universities - 100% online
Join over 3,400 global companies that choose Coursera for Business
Upskill your employees to excel in the digital economy