Informações sobre o curso
4.7
90 classificações
22 avaliações

100% online

Comece imediatamente e aprenda em seu próprio cronograma.

Prazos flexíveis

Redefinir os prazos de acordo com sua programação.

Nível iniciante

Aprox. 9 horas para completar

Sugerido: 4 weeks of study, 3-4 hours/week...

Inglês

Legendas: Inglês

100% online

Comece imediatamente e aprenda em seu próprio cronograma.

Prazos flexíveis

Redefinir os prazos de acordo com sua programação.

Nível iniciante

Aprox. 9 horas para completar

Sugerido: 4 weeks of study, 3-4 hours/week...

Inglês

Legendas: Inglês

Programa - O que você aprenderá com este curso

Semana
1
3 horas para concluir

Introduction to the X-Factor

The X-factor within information security is human behavior within and outside your organization. Our introduction includes an overview of information security management and its goals as well as describing the problem created by non-malicious insider behavior. We include discussion about the purpose of training within organizational cybersecurity efforts and whether it is achieving its purpose....
4 vídeos (total de (Total 16 mín.) min), 5 leituras, 2 testes
4 videos
Security and Employee Compliance4min
Industry Q&A: Security and End Users1min
Pulling it together8min
5 leituras
Learning Objectives1min
MISQ Executive: Information Security Management Overview45min
Phishing Attacks Hurt Convenience Of Online Banking In The Workplace10min
3 things every CISO should know10min
Shadow IT: Mitigating Security Risks10min
1 exercício prático
Introduction to the X-Factor Quiz10min
Semana
2
2 horas para concluir

Security Education: Training & Awareness

Within this topic we will discuss traditional training efforts. Security education, training and awareness (SETA) programs are designed to reduce the incidence of accidental security breaches. Through the readings you will learn about the design and delivery of these programs as well as various training techniques. This module concludes with a discussion about your experience and opinion about organizational security training....
4 vídeos (total de (Total 17 mín.) min), 4 leituras, 2 testes
4 videos
Industry Q&A: SETA in Real Life2min
Industry Q&A: Customers and Security Training2min
Pulling it together5min
4 leituras
Learning Objectives1min
Security Education, Training and Awareness20min
Training20min
Making Security Awareness Work20min
2 exercícios práticos
SETA Practice Quiz20min
Security Education: Training and Awareness Quiz10min
Semana
3
4 horas para concluir

Reasons Why Traditional Training Efforts Fail

In this module you will understand why traditional training efforts through SETA programs may fail. You will learn about human behavior and how understanding it can help managers better leverage their security efforts. Finally, through the readings you will also see that this is a global issue. The readings present examples of existing awareness campaigns in U.K., in Australia, in Canada and Africa. ...
4 vídeos (total de (Total 15 mín.) min), 5 leituras, 3 testes
4 videos
Employee Habits, Errors, and Security Breaches4min
Habituation: What is it?5min
Pulling it together3min
5 leituras
Learning Objectives1min
Why Do Cybersecurity Awareness Campaigns Fail?50min
The Impact of Past Behavior45min
How Does Behavior Become Habitual?20min
Global Threat Report30min
2 exercícios práticos
Why Do Cybersecurity Awareness Campaigns Fail Quiz14min
Test Your Knowledge!20min
Semana
4
2 horas para concluir

Threat Intelligence

We will conclude by identifying some novel problems and practices that organizations are experiencing. You will learn about hactivism, cyberinsurance, and ransomware through popular press readings about recent security problems that landed companies on the front page. ...
3 vídeos (total de (Total 14 mín.) min), 6 leituras, 2 testes
3 videos
Industry Q&A: Threat Intelligence2min
Pulling it together5min
6 leituras
Learning Objectives1min
What is threat intelligence?20min
Rise of Hacktivism20min
Cyber Insurance15min
Protecting yourself from Ransomware10min
Ransomware15min
2 exercícios práticos
Practice quiz: Test your threat intelligence!20min
Test your knowledge of threat intelligence10min
4.7
22 avaliaçõesChevron Right

33%

comecei uma nova carreira após concluir estes cursos

33%

consegui um benefício significativo de carreira com este curso

Melhores avaliações

por ZLMar 19th 2017

There is a lot of practical and actionable information in this course related to cybersecurity. I would highly recommend anyone interested in their organization's cybersecurity take this course!

por JRApr 17th 2017

Great course, understanding that our biggest security threat is our own behaviour is key to building cybersecurity.

Instrutores

Avatar

Dr. Humayun Zafar

Associate Professor of Information Security and Assurance
Information Systems
Avatar

Dr. Traci Carte

Associate Professor Chair, Information Systems
Information Systems
Avatar

Herbert J. Mattord, Ph.D., CISM, CISSP, CDP

Associate Professor in Information Security and Assurance
Information Systems
Avatar

Mr. Andy Green

Lecturer of Information Security and Assurance
Kennesaw State University - Department of Information Systems
Avatar

Michael Whitman, Ph.D., CISM, CISSP

Professor of Information Security
Information Systems

Sobre Sistema de Universidades da Geórgia

The University System of Georgia is composed of 28 higher education institutions including 4 research universities, 2 regional universities, 12 state universities, 13 state colleges and the Skidaway Institute of Oceanography. The Georgia Public Library System, encompassing 61 library systems throughout Georgia, is also part of the University System....

Sobre o Programa de cursos integrados Cybersecurity: Developing a Program for Your Business

Cybersecurity is an essential business skill for the evolving workplace. For-profit companies, government agencies, and not-for-profit organizations all need technologically proficient, business-savvy information technology security professionals. In this Specialization, you will learn about a variety of processes for protecting business assets through policy, education and training, and technology best practices. You’ll develop an awareness of the risks and cyber threats or attacks associated with modern information usage, and explore key technical and managerial topics required for a balanced approach to information protection. Topics will include mobility, the Internet of Things, the human factor, governance and management practices....
Cybersecurity: Developing a Program for Your Business

Perguntas Frequentes – FAQ

  • Ao se inscrever para um Certificado, você terá acesso a todos os vídeos, testes e tarefas de programação (se aplicável). Tarefas avaliadas pelos colegas apenas podem ser enviadas e avaliadas após o início da sessão. Caso escolha explorar o curso sem adquiri-lo, talvez você não consiga acessar certas tarefas.

  • Quando você se inscreve no curso, tem acesso a todos os cursos na Especialização e pode obter um certificado quando concluir o trabalho. Seu Certificado eletrônico será adicionado à sua página de Participações e você poderá imprimi-lo ou adicioná-lo ao seu perfil no LinkedIn. Se quiser apenas ler e assistir o conteúdo do curso, você poderá frequentá-lo como ouvinte sem custo.

Mais dúvidas? Visite o Central de Ajuda ao Aprendiz.