足彩胜负彩游戏说明 足彩胜负彩单场怎么买 雪缘园足彩胜负彩比分直播 足彩胜负彩专家推荐 欧洲杯足彩胜负彩 足彩胜负彩规则任9 足彩胜负彩18020期分析 足彩胜负彩历史赔率 足彩胜负彩历史开奖结果 足彩胜负彩玩法介绍 足彩胜负彩下期对阵 足彩胜负彩规则及奖金 搜狐足彩胜负彩12127 足彩胜负彩中奖概率 18136期足彩胜负彩开奖

企業網絡安全規劃專項課程

Cybersecurity: Developing a Program for Your Business

Master the Fundamentals of Cybersecurity。Learn to assess cyber threats and protect business information assets.

喬治亞大學

Coursera

商業管理

簡單(初級)

4 個月

本課程由Coursera和Linkshare共同提供
  • 英語
  • 1218

課程概況

Cybersecurity is an essential business skill for the evolving workplace. For-profit companies, government agencies, and not-for-profit organizations all need technologically proficient, business-savvy information technology security professionals. In this Specialization, you will learn about a variety of processes for protecting business assets through policy, education and training, and technology best practices. You’ll develop an awareness of the risks and cyber threats or attacks associated with modern information usage, and explore key technical and managerial topics required for a balanced approach to information protection. Topics will include mobility, the Internet of Things, the human factor, governance and management practices.

你將學到什么

Ransomware

Cybersecurity

Internet Of Things (IOT)

Mobile Security

包含課程

課程1
Cybersecurity and Mobility

This course is for you if you are interested in transitioning toward a managerial role in cybersecurity and mobility. Through interviews with industry experts in this area, you will be able to analyze innovations powering the rapid spread of information technology and how they present new challenges for protecting data. For example, mobile devices increase convenience but often bypass traditional security measures. After this course, you will be able to describe how the nature of the threat evolves, as culprits employ a burgeoning set of sophisticated tools to take advantage of our growing reliance on networks for critical-data exchange. If you want to pursue a career in the public sector, the stakes are high as well. The proliferation of hackers, inevitable human errors, bring-your-own-device (BYOD) initiatives, and the ever-broadening need to share information weigh heavily on government and education organizations, and consume substantial resources. The Pentagon, for example, has proposed to spend $23 billion on network security initiatives through 2018. This sounds like a large sum, until you consider the scope and importance of the U.S. government information resources this investment must protect. After completing the course modules you will be able to explain how yesterday’s prevention strategies are no longer adequate for stopping advanced, targeted attacks. Effective cybersecurity must be multi-dimensional and tiered, as threats can originate from virtually anywhere, target numerous levels of an organization, and sometimes persist for months or years before an information security staff is aware of an attack or breach. Therefore securing networks requires a holistic approach that incorporates several elements.

課程2
Cybersecurity and the Internet of Things

Welcome! You may have heard about the Internet of Things (IoT). But you may also have wondered about what it is. Or for that matter, what does it mean to you or an organization. This course is for you if you are curious about the most recent trends and activities in the internet capabilities and concerns about programmed devices. There are complexities and areas of necessary awareness when the industrial sector becomes connected to your home. Security policies and practices have not yet caught up to the internet capabilities of some of our most common products. The “connected home”, “consumer wearables”, or even an employee’s HVAC system may cause an unanticipated threat to your business environment. You will explore current security and privacy related concerns in each of these areas. Every module will include readings, videos, case studies, and a quiz to help make sure you understand the material and concepts we talk about. This course offers a place to learn, reflect, and plan for a smart community approach to IoT. Portions of this course may seem extremely technical in nature. That is because the “things” in IoT represents engineering. Try to grasp the concept in that case.

課程3
Cybersecurity and the X-Factor

What is the X-Factor? In Cybersecurity, the X-Factor related to unknown and unpredictable human behavior within and outside of your organization. “No one really knows why humans do what they do”, (David K. Reynolds), and because of this organizations can be unprepared for malicious, untrained, or even best intentioned behavior that can cause alarm and sometimes irreparable harm. This course will introduce you to the types of training available to reduce the impact of the X-Factor, evaluate its effectiveness, explore the Security Education, Training and Awareness (SETA) program, and learn why it may fail. The course will conclude with information designed to assist you with some critical components for your business security program. Activities focused on hactivism, cyberinsurance, and ransomware will round out your knowledge base. Your team of instructors has prepared a series of readings, discussions, guest lectures, and quizzes to engage you in this exciting topic.

課程4
The Business of Cybersecurity Capstone

This course intends to make the student familiar with information security management. When you have finished with this course you will know more about: ? Governance: including the mission, roles and responsibilities of the InfoSec governance function, and the strategic planning process and InfoSec’s role in the organization’s strategic planning effort. ? You will understand the various types of InfoSec policies and how effective information security policy is created and used. ? Risk management and the risk management process ? Certain laws and ethical issues impacting information security in the organization. And some common information security management practices such as benchmarking and performance measures.

Magoosh
聲明:MOOC中國十分重視知識產權問題,我們發布之課程均源自下列機構,版權均歸其所有,本站僅作報道收錄并尊重其著作權益。感謝他們對MOOC事業做出的貢獻!
  • Coursera
  • edX
  • OpenLearning
  • FutureLearn
  • iversity
  • Udacity
  • NovoEd
  • Canvas
  • Open2Study
  • Google
  • ewant
  • FUN
  • IOC-Athlete-MOOC
  • World-Science-U
  • Codecademy
  • CourseSites
  • opencourseworld
  • ShareCourse
  • gacco
  • MiriadaX
  • JANUX
  • openhpi
  • Stanford-Open-Edx
  • 網易云課堂
  • 中國大學MOOC
  • 學堂在線
  • 頂你學堂
  • 華文慕課
  • 好大學在線CnMooc
  • (部分課程由Coursera、Udemy、Linkshare共同提供)

© 2008-2019 MOOC.CN 慕課改變你,你改變世界

足彩胜负彩分析软件
足彩胜负彩游戏说明 足彩胜负彩单场怎么买 雪缘园足彩胜负彩比分直播 足彩胜负彩专家推荐 欧洲杯足彩胜负彩 足彩胜负彩规则任9 足彩胜负彩18020期分析 足彩胜负彩历史赔率 足彩胜负彩历史开奖结果 足彩胜负彩玩法介绍 足彩胜负彩下期对阵 足彩胜负彩规则及奖金 搜狐足彩胜负彩12127 足彩胜负彩中奖概率 18136期足彩胜负彩开奖
大乐透小复式守号 456棋牌app 白姐心水资料大全 一只股票分析论文 通比牛牛下载 吉林快3网站平台 甘肃十一选五走势图一定牛一一 福利彩票双色球开奖结果 网络棋牌输了好多钱怎么办啊 为什么辉煌棋牌下载不了 时时彩独胆是什么意思 高铁京沈高铁一百米之内能赚钱吗 二十一点要牌技巧 广东快乐10分赔率 辽宁十一选五如何选号 重庆时时猜龙虎走势图