Sobre este Programa de cursos integrados
cursos 100% online

cursos 100% online

Comece imediatamente e aprenda em seu próprio cronograma.
Cronograma flexível

Cronograma flexível

Definição e manutenção de prazos flexíveis.
Nível iniciante

Nível iniciante

Horas para completar

Aprox. 1 meses para completar

10 horas/semana sugeridas
Idiomas disponíveis

Inglês

Legendas: Inglês...
cursos 100% online

cursos 100% online

Comece imediatamente e aprenda em seu próprio cronograma.
Cronograma flexível

Cronograma flexível

Definição e manutenção de prazos flexíveis.
Nível iniciante

Nível iniciante

Horas para completar

Aprox. 1 meses para completar

10 horas/semana sugeridas
Idiomas disponíveis

Inglês

Legendas: Inglês...

Como o Programa de cursos integrados funciona

Fazer cursos

Um programa de cursos integrados do Coursera é uma série de cursos para ajudá-lo a dominar uma habilidade. Primeiramente, inscreva-se no programa de cursos integrados diretamente, ou avalie a lista de cursos e escolha por qual você gostaria de começar. Ao se inscrever em um curso que faz parte de um programa de cursos integrados, você é automaticamente inscrito em todo o programa de cursos integrados. É possível concluir apenas um curso — você pode pausar a sua aprendizagem ou cancelar a sua assinatura a qualquer momento. Visite o seu painel de aprendiz para controlar suas inscrições em cursos e progresso.

Projeto prático

Todos os programas de cursos integrados incluem um projeto prático. Você precisará completar com êxito o(s) projeto(s) para concluir o programa de cursos integrados e obter o seu certificado. Se o programa de cursos integrados incluir um curso separado para o projeto prático, você precisará completar todos os outros cursos antes de iniciá-lo.

Obtenha um certificado

Ao concluir todos os cursos e completar o projeto prático, você obterá um certificado que pode ser compartilhado com potenciais empregadores e com sua rede profissional.

how it works

Este Programa de cursos integrados contém 4 cursos

Curso1

Homeland Security & Cybersecurity Connection - It's Not About the Terrorists

4.7
110 classificações
40 avaliações
Welcome to Course 1 in CS4950, Homeland Security and Cybersecruity. In this course we examine the origins of homeland security and its co0nnection with cybersecurity. Homeland security is about safeguarding the United States from domestic catastrophic destruction. Catastrophic destruction comes in two forms: natural and manmade. For most of history the manmade variety came in the form of warfare and required the combined resources of a nation state. All that changed March 20th, 1995. On that date, members of a quasi-religious cult in Japan attacked the Tokyo subway system using Sarin gas. It was the first deployment of a weapon of mass destruction my a non-state actor. The power of destruction once reserved to nation states was now available to small groups, even individuals. The incident was a wake up call for governments around the world. Defense establishments designed to keep rogue states in check were practically useless against non-state actors. Overnight, the number of potential enemies multiplied a hundred, maybe even a thousand-fold. In response to the Tokyo Subway Attacks, the United States took measures to protect itself from WMD attack by non-state actors. Those measures were still being enacted when the nation was attacked on 9/11. On September 11, 2001, nineteen hijackers inflicted as much damage as the Imperial Japanese Navy on December 7, 1941. The investigating 9/11 Commission noted the attacks for their "surpassing disproportion". The hijackers had achieved WMD effects without using WMD. They did this by subverting the nation's transportation infrastructure, turning passenger jets into guided missiles. Again, the security implications were profound. Non-state actors seeking to inflict domestic catastrophic destruction did not need to import, fabricate, or acquire WMD as the nation was surrounded by the means of its own destruction in the form of critical infrastructure. The vulnerability of critical infrastructure had not gone unnoticed. Again, in response to the Tokyo Subway attacks, which themselves had been an attack on Japanese infrastructure, President Clinton in 1996 commissioned a panel to investigate the threat to United States' infrastructure. The panel replied in 1997 that there was no immediate threat to US infrastructure, but they were concerned with the growing risk of cyber attack. The same cyber physical systems that fueled the explosive growth of the Internet were being incorporated into Industrial Control Systems that underpinned much of the nation's critical infrastructure. The panel noted that the knowledge and skills necessary to mount a cyber attack on the nation's infrastructure was growing. As a result of this observation, President Clinton in 1998 ordered the protection of US critical infrastructure, especially from cyber attack. Following 9/11, critical infrastructure protection and cybersecurity were designated core missions in the 2002 Homeland Security Act establishing the new Department of Homeland Security. They remain core missions to this day, but many don't see the connection. The connection is this: cybersecurity is essential to critical infrastructure protection, which is essential to homeland security, which is about safeguarding the United States from domestic catastrophic destruction. I look forward to working with you in the coming lessons. Best wishes and good luck! Course 1: Homeland Security & Cybersecurity Connection Course 2: Cybersecurity Policy for Water and Electricity Infrastructures Course 3: Cybersecurity Policy for Aviation and Internet Infrastructures Course 4: Homeland Security & Cybersecurity Future...
Curso2

Cybersecurity Policy for Water and Electricity Infrastructures

4.8
60 classificações
17 avaliações
This course will examine the drinking water and electricity infrastructures, and various policies that have been developed to help guide and strengthen their cybersecurity programs. The drinking water and electricity infrastructures are two of fourteen subsectors comprising what are known as "lifeline infrastructure". The 2013 National Infrastructure Protection Plan identifies four lifeline infrastructure sectors: 1) water, 2) energy, 3) transportation, and 4) communications. These sectors are designated "lifeline" because many other infrastructures depend upon them. The drinking water subsector is part of the water sector, and the electricity subsector is part of the energy sector. Both subsectors are overseen by the Department of Homeland Security National Protection and Programs Directorate which manages the DHS National Infrastructure Protection Program. The NIPP employs a five-step continuous improvement program called the Risk Management Framework. NIPP implementation is overseen by DHS-designated Sector-Specific Agencies staffed by various Federal departments. The Sector-Specific Agencies work in voluntary cooperation with industry representatives to apply the Risk Management Framework and document results in corresponding Sector-Specific Plans. The program began in 2007 and the most recent Sector-Specific Plans were published in 2016. In February 2013, President Obama issued Executive 13636 directing the National Institute of Standards and Technology to develop a voluntary set of recommendations for strengthening infrastructure cybersecurity measures. EO13636 also asked Federal agencies with regulating authority to make a recommendation whether the NIST Cybersecurity Framework should be made mandatory. The Environmental Protection Agency who is both the SSA and regulatory authority for the drinking water subsector recommended voluntary application of the NIST Cybersecurity Framework. The Department of Energy who is both the SSA and regulatory authority for the electricity subsector replied that it was already implementing the Electricity Subsector Cybersecurity Capability Maturity Model, which indeed was what the NIST Cybersecurity Framework was based on. The Department of Energy, though, recommended voluntary application of the ES-C2M2. This module will examine both the drinking water and electricity lifeline infrastructure subsectors, and elements and application of the NIST Cybersecurity Framework and ES-C2M2....
Curso3

Cybersecurity Policy for Aviation and Internet Infrastructures

4.8
58 classificações
15 avaliações
In this course we will examine the aviation and Internet infrastructures, and various policies that have been developed to help guide and strengthen their cybersecurity programs. The aviation and Internet infrastructures are also considered "lifeline infrastructure" as part of the transportation and communications sectors. Both subsectors are overseen by the Department of Homeland Security National Protection and Programs Directorate which manages the DHS National Infrastructure Protection Program. SSA responsibility for the aviation subsector is shared between the Transportation Security Administration and Federal Aviation Administration under the auspices of the Department of Homeland Security and Department of Transportation respectively. The Department of Homeland Security retains sole responsibility as the Sector-Specific Agency for the Internet subsector. While TSA and FAA have regulatory over the aviation subsector, DHS has no regulatory authority whatsoever over the Internet. In response to Executive Order 13636 issued by President Obama in February 2013, both sets of SSAs recommended continuing with voluntary cybersecurity measures. TSA and FAA reported they were working to implement the Transportation Roadmap across all transportation subsectors, including aviation. DHS reported that it was working with Internet providers to implement the Cyber Assessment Risk Management Approach. Despite some differences, the Transportation Roadmap and CARMA are very similar to the NIST Cybersecrity Framework and ES-C2M2 examined previously. That is to say, they are predicated on a continuous improvement process that engages the whole organization in identifying and implementing incremental changes to enhance cybersecurity practices based on prevailing standards. This module will examine both the aviation and Internet lifeline infrastructure subsectors, and elements and application of the Transportation Roadmap and CARMA....
Curso4

Homeland Security and Cybersecurity Future

4.8
39 classificações
12 avaliações
This course takes a look at the future of cybersecurity with respect to what is being done to lessen the potential for catastrophic destruction resulting from cyber attack on critical infrastructure. In this respect, we take a short survey of potential technological solutions and response options. We conclude this module by taking a look at unique aspects of the cyber profession and personal considerations for those who want to make cybersecurity a career....

Instrutores

Avatar

Richard White

Assistant Research Professor
Computer Science

Sobre University of Colorado System

The University of Colorado is a recognized leader in higher education on the national and global stage. We collaborate to meet the diverse needs of our students and communities. We promote innovation, encourage discovery and support the extension of knowledge in ways unique to the state of Colorado and beyond....

Perguntas Frequentes – FAQ

  • Sim! Para começar, clique na carta de curso que lhe interessa e se inscreva. Você pode se inscrever e concluir o curso para ganhar um certificado compartilhável ou você pode auditar para ver os materiais do curso de graça. Quando você se inscrever em um curso que faz parte de uma especialização, você está automaticamente inscrito para a especialização completa. Visite o seu painel de aluno para acompanhar o seu progresso.

  • Este curso é totalmente on-line, então não existe necessidade de aparecer em uma sala de aula pessoalmente. Você pode acessar suas palestras, leituras e atribuições a qualquer hora e qualquer lugar, via web ou dispositivo móvel.

  • Esta Especialização não carrega créditos universitários, mas algumas universidades podem optar por aceitar certificados de especialização como crédito. Verifique com sua instituição para saber mais.

  • This specialization includes approximately 60 hours of course material, of which about 20 hours is related to project work.

  • While there are no specific prerequisites for this specialization, it does assume some common understanding about computers and the Internet. Similarly, while this is mostly a non-technical course, it does require analytical and problem-solving skills on the part of the learner.

  • Learners are not required to take courses in any particular order, though we recommend the learner complete the courses in ascending numerical sequence.

  • This course will provide insight and direction on developing and implementing a coherent cybersecurity program within an organization. The primary benefit of such a program is that will accommodate strategic planning, giving an organization a sense of where it is, where it's going, and how it can get there. It offers a means of managing your destiny.

Mais dúvidas? Visite o Central de Ajuda ao Aprendiz.