We may earn an affiliate commission when you visit our partners.
Course image
Michael Whitman, Ph.D., CISM, CISSP, Dr. Traci Carte, Herbert J. Mattord, Ph.D., CISM, CISSP, CDP, Andy Green, Ph.D., and Dr. Humayun Zafar, CEH, CISM, CRISC, PCIP

What is the X-Factor? In Cybersecurity, the X-Factor related to unknown and unpredictable human behavior within and outside of your organization. “No one really knows why humans do what they do”, (David K. Reynolds), and because of this organizations can be unprepared for malicious, untrained, or even best intentioned behavior that can cause alarm and sometimes irreparable harm.

Read more

What is the X-Factor? In Cybersecurity, the X-Factor related to unknown and unpredictable human behavior within and outside of your organization. “No one really knows why humans do what they do”, (David K. Reynolds), and because of this organizations can be unprepared for malicious, untrained, or even best intentioned behavior that can cause alarm and sometimes irreparable harm.

This course will introduce you to the types of training available to reduce the impact of the X-Factor, evaluate its effectiveness, explore the Security Education, Training and Awareness (SETA) program, and learn why it may fail. The course will conclude with information designed to assist you with some critical components for your business security program. Activities focused on hactivism, cyberinsurance, and ransomware will round out your knowledge base. Your team of instructors has prepared a series of readings, discussions, guest lectures, and quizzes to engage you in this exciting topic.

Enroll now

What's inside

Syllabus

Introduction to the X-Factor
The X-factor within information security is human behavior within and outside your organization. Our introduction includes an overview of information security management and its goals as well as describing the problem created by non-malicious insider behavior. We include discussion about the purpose of training within organizational cybersecurity efforts and whether it is achieving its purpose.
Read more
Security Education: Training & Awareness
Within this topic we will discuss traditional training efforts. Security education, training and awareness (SETA) programs are designed to reduce the incidence of accidental security breaches. Through the readings you will learn about the design and delivery of these programs as well as various training techniques. This module concludes with a discussion about your experience and opinion about organizational security training.
Reasons Why Traditional Training Efforts Fail
In this module you will understand why traditional training efforts through SETA programs may fail. You will learn about human behavior and how understanding it can help managers better leverage their security efforts. Finally, through the readings you will also see that this is a global issue. The readings present examples of existing awareness campaigns in U.K., in Australia, in Canada and Africa.
Threat Intelligence
We will conclude by identifying some novel problems and practices that organizations are experiencing. You will learn about hactivism, cyberinsurance, and ransomware through popular press readings about recent security problems that landed companies on the front page.

Good to know

Know what's good
, what to watch for
, and possible dealbreakers
Teaches the X-Factor in cybersecurity, which is the highly influential but unpredictable human behavior in security
Taught by instructors who are experts in cybersecurity, including those with certifications like CISSP and CISM
Examines traditional training and awareness efforts, evaluating their effectiveness and reasons for failure
Provides insights into novel problems and practices like hactivism, cyberinsurance, and ransomware
Includes guest lectures and interactive discussions to engage and enhance understanding

Save this course

Save Cybersecurity and the X-Factor to your list so you can find it easily later:
Save

Reviews summary

Cybersecurity through a people-centric lens

Learners say that Cybersecurity and the X-Factor is an excellent, well-done course that provides engaging and useful materials for learning about cybersecurity from a human-centric perspective. The readings are especially helpful and insightful, and they offer a unique perspective on the field. Through this course, learners gain a deeper understanding of how human psychology can affect cybersecurity, which helps them to build better security aware cultures within their organizations.
Some learners found the content to be challenging, but said it ultimately helped them to understand the material better.
"This was a pretty challenging course."
"The sections on theories of human behavior were a bit deep but they did help me to understand how human behavior is so important improving cyber security."
The information is well-organized, with clear explanations and good examples.
"It was very helpful in learning things related to this topic."
"Very informative course and specially the reading are extremely useful."
This course uniquely focuses on the human side of cybersecurity.
"This course explores the human side effect."
"It gave me new research area that what we can do in future. Once again thanks coursera."
Learners say this course is very informative and offers useful, practical knowledge.
"No doubt, informative n rice experience. tm"
"This course thought me a lot of things I would love to delve a bit deeper in."
"The course has been very insightful and useful in understanding why most of the SETA program fails."
A few learners felt the focus on reading was ineffective and said they would have preferred more video content.
"Learning through reading through PDF is not effective, a proper illustrative and explaining video based totorial would have added value."

Activities

Be better prepared before your course. Deepen your understanding during and after it. Supplement your coursework and achieve mastery of the topics covered in Cybersecurity and the X-Factor with these activities:
Review Probability
Review probability concepts to strengthen foundational understanding for the course.
Show steps
  • Review basic probability theory
  • Practice solving probability problems
Attend Cybersecurity Awareness Workshops
Enhance your knowledge of cybersecurity best practices through structured workshops.
Browse courses on Cybersecurity Awareness
Show steps
  • Identify industry-leading cybersecurity awareness workshops
  • Register for a workshop that aligns with your interests
  • Actively participate and engage with experts
Connect with Cybersecurity Industry Mentors
Seek guidance and support from experienced cybersecurity professionals.
Browse courses on Mentorship
Show steps
  • Identify potential mentors through professional organizations
  • Reach out to individuals and express your interest
  • Build a mutually beneficial mentoring relationship
Five other activities
Expand to see all activities and additional details
Show all eight activities
Learn about Penetration Testing with Guided Tutorials
Enhance your understanding of penetration testing techniques through guided tutorials.
Browse courses on Penetration Testing
Show steps
  • Identify reputable tutorials on penetration testing
  • Follow the tutorials step-by-step
  • Practice the techniques in a lab environment
Volunteer for Cybersecurity Non-Profit Organizations
Contribute to the cybersecurity community and gain practical experience through volunteering.
Browse courses on Community Involvement
Show steps
  • Identify non-profit organizations focused on cybersecurity
  • Explore available volunteer opportunities
  • Select and apply for a relevant volunteer role
Practice Cybersecurity Incident Response Drills
Develop hands-on experience in cybersecurity incident response through practice drills.
Browse courses on Incident Response
Show steps
  • Identify available cybersecurity incident response drills
  • Simulate real-world security incidents
  • Analyze and respond to security incidents effectively
Read 'Security Engineering: A Guide to Building Dependable Distributed Systems'
Gain insights into the principles and practices of modern security engineering.
Show steps
  • Acquire the book through a library or bookstore
  • Read and understand the fundamental concepts
  • Apply the principles to practical cybersecurity scenarios
Participate in Cybersecurity Capture the Flag (CTF) Competitions
Test and refine your cybersecurity skills in a competitive environment through Capture the Flag competitions.
Show steps
  • Identify upcoming CTF competitions
  • Register and team up with other participants
  • Solve cybersecurity challenges and capture flags

Career center

Learners who complete Cybersecurity and the X-Factor will develop knowledge and skills that may be useful to these careers:
Network Security Engineer
Network Security Engineers design, implement, and maintain network security systems. They must have a deep understanding of cybersecurity threats and how to prevent them. This course is a great fit for Network Security Engineers as it will provide them with a strong foundation on cybersecurity and help them learn about the latest cybersecurity trends and technologies, as well as the regulations and standards that govern cybersecurity. This will allow them to pursue a successful and rewarding career as a Network Security Engineer.
Penetration Tester
Penetration Testers are ethical hackers who are hired by organizations to test the security of their computer networks and systems. They must have a deep understanding of cybersecurity threats and how to exploit them. This course will equip Penetration Testers with the knowledge and skills they need to succeed in their roles. It will provide them with a strong foundation on cybersecurity and help them learn about the latest cybersecurity trends and technologies, as well as the regulations and standards that govern cybersecurity. This course is a valuable resource for anyone looking to pursue a career as a Penetration Tester.
IT Security Specialist
IT Security Specialists are responsible for protecting an organization's computer networks and systems from cyberattacks. This course will help them build a foundation in cybersecurity and learn about the latest cybersecurity trends and technologies, as well as the regulations and standards that govern cybersecurity.
Security Engineer
Security Engineers are responsible for designing, implementing, and maintaining cybersecurity systems. They must have a deep understanding of cybersecurity threats and how to prevent them.
Information Security Analyst
Information Security Analysts design and implement security measures to protect an organization’s computer networks and systems. As a result, they must possess a deep understanding of cybersecurity best practices and how to effectively manage an organization's cybersecurity risks. This course will be extremely useful for aspiring Information Security Analysts. It will help them build a strong foundation on cybersecurity threats and how to prevent them. They will also learn about the latest cybersecurity trends and technologies, as well as the regulations and standards that govern cybersecurity. Armed with this knowledge, learners can pursue opportunities as Information Security Analysts with confidence.
Security Analyst
Security Analysts are responsible for monitoring an organization's computer networks and systems for security threats. They must have a deep understanding of cybersecurity threats and how to prevent them. This course will be extremely helpful to Security Analysts by providing them with a strong foundation on cybersecurity. They will also learn about the latest cybersecurity trends and technologies, as well as the regulations and standards that govern cybersecurity. This course may help you land your first job in the field.
Systems Administrator
Systems Administrators are responsible for managing an organization's computer networks and systems. They must have a deep understanding of cybersecurity threats and how to prevent them. This course will be helpful to Systems Administrators by providing them with a strong foundation in cybersecurity. They will also learn about the latest cybersecurity trends and technologies, as well as the regulations and standards that govern cybersecurity. With a strong understanding of cybersecurity, Systems Administrators can better protect their organizations from cyberattacks.
Compliance Officer
Compliance Officers are responsible for developing, implementing, and managing an organization's compliance program. They must stay up-to-date on all the latest cybersecurity regulations. This course will help equip Compliance Officers with a solid understanding of cybersecurity threats and how to prevent them. It will also provide them with the tools they need to develop and implement effective cybersecurity policies and procedures. Upon completion of this course, learners will be better prepared to advance their careers as Compliance Officers.
Risk Manager
Risk Managers are responsible for identifying, assessing, and mitigating risks to an organization. They must have a deep understanding of cybersecurity threats and how to manage cybersecurity risks. This course will be helpful to Risk Managers by providing them with a strong foundation on cybersecurity and equipping with the knowledge they need to understand and evaluate cybersecurity risks. It will also help them stay up to date on the latest cybersecurity trends and technologies. With a strong understanding of cybersecurity, Risk Managers can excel in their roles and contribute to the security of their organizations.
IT Auditor
IT Auditors are responsible for evaluating an organization's IT systems and practices to ensure that they are secure and compliant with regulations. A firm grasp of cybersecurity threats and best practices are essential for success in this role. This course will be useful to IT Auditors by equipping them with a strong foundation on cybersecurity and providing them with the knowledge they need to understand and evaluate cybersecurity risks and security controls. It will also help them stay up to date on the latest cybersecurity trends and technologies. With a strong understanding of cybersecurity, IT Auditors can excel in their roles and contribute to the security of their organizations.
Security Consultant
Security Consultants are responsible for providing cybersecurity advice to organizations. They must have a deep understanding of cybersecurity threats and how to prevent them. This course will be useful to Security Consultants by equipping them with a strong foundation on cybersecurity. It will also provide them with the tools and knowledge they need to provide expert advice to organizations on how to protect their computer networks and systems from cyberattacks.
Web Developer
Web Developers design, develop, and maintain websites. They must have a deep understanding of cybersecurity threats and how to prevent them. This course will be helpful to Web Developers by providing them with a foundation in cybersecurity and helping them learn about the latest cybersecurity trends and technologies, as well as the regulations and standards that govern cybersecurity. With a strong understanding of cybersecurity, Web Developers can build more secure websites and web applications.
Technical Writer
Technical Writers create documentation for software applications and other technical products. They must have a deep understanding of cybersecurity threats and how to prevent them. This course will be helpful to Technical Writers by providing them with a foundation in cybersecurity and helping them learn about the latest cybersecurity trends and technologies, as well as the regulations and standards that govern cybersecurity. With a strong understanding of cybersecurity, Technical Writers can create more secure documentation for software applications and other technical products.
Software Developer
Software Developers design, develop, and maintain software applications. They must have a deep understanding of cybersecurity threats and how to prevent them. This course will be helpful to Software Developers by providing them with a foundation in cybersecurity and helping them learn about the latest cybersecurity trends and technologies, as well as the regulations and standards that govern cybersecurity. With a strong understanding of cybersecurity, Software Developers can build more secure software applications.
Analyst
Analysts are responsible for understanding a range of complex information. They investigate and collect data to help businesses operate more efficiently and effectively, often by identifying trends that would not be immediately obvious to an outsider. This course will be helpful to Analysts by providing them with a strong foundation on cybersecurity. By comprehending the threats that exist, they are better equipped to identify them in the data which they analyze and report on.

Reading list

We've selected 11 books that we think will supplement your learning. Use these to develop background knowledge, enrich your coursework, and gain a deeper understanding of the topics covered in Cybersecurity and the X-Factor.
Provides practical guidance on how to design and deliver effective security training programs that reduce the risk of accidental security breaches. It valuable resource for managers who want to improve their organization's cybersecurity posture.
Explores the psychological factors that influence human behavior in cybersecurity. It valuable resource for understanding why traditional training efforts often fail and how to develop more effective training programs.
Provides insights into the psychology of deception and its implications for cybersecurity. It valuable resource for anyone who wants to learn more about how to protect themselves from social engineering attacks.
Provides a comprehensive overview of ransomware. It valuable resource for understanding the different types of ransomware, how to prevent ransomware attacks, and how to respond to ransomware attacks.
Provides a unique perspective on cybersecurity from the perspective of a former hacker. It valuable resource for understanding the different types of cybersecurity attacks and how to defend against them.
Provides a comprehensive overview of security risk assessment. It valuable resource for understanding the different types of security risks and how to assess them.
Provides a comprehensive overview of malware analysis. It valuable resource for understanding the different types of malware and how to analyze them.
Provides a comprehensive overview of malware analysis. It valuable resource for understanding the different types of malware and how to analyze them.
Classic account of a real-life cybersecurity investigation. It valuable resource for understanding the different types of cybersecurity threats and how to investigate them.
Detailed account of the Stuxnet cyberattack. It valuable resource for understanding the different types of cybersecurity threats and how to defend against them.

Share

Help others find this course page by sharing it with your friends and followers:

Similar courses

Here are nine courses similar to Cybersecurity and the X-Factor.
IBM Guardium Data Protection Foundations
The Complete Cyber Security Course : Network Security!
Building and Implementing a Security Awareness Training...
Application Security
Personal Training Masterclass: Your Complete Training Plan
Earn a Lean Physique: A Training and Nutrition Plan
Learn AWS Identity Management with AWS IAM, SSO &...
Implement a Docker Registry
Fitness For Beginners
Our mission

OpenCourser helps millions of learners each year. People visit us to learn workspace skills, ace their exams, and nurture their curiosity.

Our extensive catalog contains over 50,000 courses and twice as many books. Browse by search, by topic, or even by career interests. We'll match you to the right resources quickly.

Find this site helpful? Tell a friend about us.

Affiliate disclosure

We're supported by our community of learners. When you purchase or subscribe to courses and programs or purchase books, we may earn a commission from our partners.

Your purchases help us maintain our catalog and keep our servers humming without ads.

Thank you for supporting OpenCourser.

© 2016 - 2024 OpenCourser