We may earn an affiliate commission when you visit our partners.
Course image
Dr. Humayun Zafar, Michael Whitman, Ph.D., CISM, CISSP, Dr. Traci Carte, Mr. Andy Green, Herbert J. Mattord, Ph.D., CISM, CISSP, CDP, Dr. Humayun Zafar, CEH, CISM, Dr. Humayun Zafar, CEH, CISM, CRISC, PCIP, and Andy Green, Ph.D.

Cybersecurity is an essential business skill for the evolving workplace. For-profit companies, government agencies, and not-for-profit organizations all need technologically proficient, business-savvy information technology security professionals. In this Specialization, you will learn about a variety of processes for protecting business assets through policy, education and training, and technology best practices. You’ll develop an awareness of the risks and cyber threats or attacks associated with modern information usage, and explore key technical and managerial topics required for a balanced approach to information protection. Topics will include mobility, the Internet of Things, the human factor, governance and management practices.

Enroll now

Share

Help others find Specialization from Coursera by sharing it with your friends and followers:

What's inside

Four courses

Cybersecurity and Mobility

(0 hours)
This course examines cybersecurity and mobility, analyzing innovations in information technology and their impact on data protection. It explores the evolution of threats and the need for multi-dimensional cybersecurity strategies.

Cybersecurity and the Internet of Things

(0 hours)
Welcome! You may have heard about the Internet of Things (IoT). This course is for you if you are curious about the most recent trends and activities in the internet capabilities and concerns about programmed devices. You will explore current security and privacy related concerns in each of these areas.

Cybersecurity and the X-Factor

(0 hours)
What is the X-Factor? In Cybersecurity, the X-Factor relates to unknown and unpredictable human behavior. This course will introduce you to the types of training available to reduce the impact of the X-Factor, evaluate its effectiveness, explore the Security Education, Training and Awareness (SETA) program, and learn why it may fail.

The Business of Cybersecurity Capstone

This course introduces information security management. Upon completion, you will understand:

Save this collection

Save Cybersecurity: Developing a Program for Your Business to your list so you can find it easily later:
Save
Our mission

OpenCourser helps millions of learners each year. People visit us to learn workspace skills, ace their exams, and nurture their curiosity.

Our extensive catalog contains over 50,000 courses and twice as many books. Browse by search, by topic, or even by career interests. We'll match you to the right resources quickly.

Find this site helpful? Tell a friend about us.

Affiliate disclosure

We're supported by our community of learners. When you purchase or subscribe to courses and programs or purchase books, we may earn a commission from our partners.

Your purchases help us maintain our catalog and keep our servers humming without ads.

Thank you for supporting OpenCourser.

© 2016 - 2024 OpenCourser