We may earn an affiliate commission when you visit our partners.
Course image
Richard White

In this course we will examine the aviation and Internet infrastructures, and various policies that have been developed to help guide and strengthen their cybersecurity programs. The aviation and Internet infrastructures are also considered "lifeline infrastructure" as part of the transportation and communications sectors. Both subsectors are overseen by the Department of Homeland Security National Protection and Programs Directorate which manages the DHS National Infrastructure Protection Program. SSA responsibility for the aviation subsector is shared between the Transportation Security Administration and Federal Aviation Administration under the auspices of the Department of Homeland Security and Department of Transportation respectively. The Department of Homeland Security retains sole responsibility as the Sector-Specific Agency for the Internet subsector. While TSA and FAA have regulatory over the aviation subsector, DHS has no regulatory authority whatsoever over the Internet. In response to Executive Order 13636 issued by President Obama in February 2013, both sets of SSAs recommended continuing with voluntary cybersecurity measures. TSA and FAA reported they were working to implement the Transportation Roadmap across all transportation subsectors, including aviation. DHS reported that it was working with Internet providers to implement the Cyber Assessment Risk Management Approach. Despite some differences, the Transportation Roadmap and CARMA are very similar to the NIST Cybersecrity Framework and ES-C2M2 examined previously. That is to say, they are predicated on a continuous improvement process that engages the whole organization in identifying and implementing incremental changes to enhance cybersecurity practices based on prevailing standards. This module will examine both the aviation and Internet lifeline infrastructure subsectors, and elements and application of the Transportation Roadmap and CARMA.

Enroll now

What's inside

Syllabus

Module 9: Aviation Infrastructure & Transportation Roadmap
In this module will examine the aviation subsector and the Transportation Roadmap for strengthening this infrastructure's resistance to cyber attack.
Read more
Module 10: Applied Transportation Roadmap
In this module we will examine the difference between cybersecurity for fixed versus mobile assets, and take a closer look at the Transportation Roadmap and apply its tenets to different hypothetical situations. Also included in this module is course exam #5. Good luck!
Module 11: Internet Infrastructure & CARMA
In this module will examine the Internet subsector and the Cyber Assessment Risk Management Approach for strengthening this infrastructure's resistance to cyber attack.
Module 12: Applied CARMA
In this module we will take a closer look at the Cyber Assessment and Risk Management Approach and apply its tenets to different hypothetical situations. Also included in this module is the course exam #6 and related project assignment. Good luck!

Good to know

Know what's good
, what to watch for
, and possible dealbreakers
Develops strategies on how to recognize and assess the risks of aviation infrastructure based on a standardized framework
Examines the implementation of the Cyber Assessment and Risk Management Approach to strengthen the security of the Internet infrastructure
Provides a study of the Department of Homeland Security National Infrastructure Protection Program and its role in guiding aviation and Internet cybersecurity programs
Students are expected to come in with a foundation in cybersecurity best practices and concepts
Students will need to be able to apply cybersecurity concepts and practices to real-world aviation and Internet infrastructure scenarios
Students will need to be able to effectively work on group projects and participate in online discussions

Save this course

Save Cybersecurity Policy for Aviation and Internet Infrastructures to your list so you can find it easily later:
Save

Reviews summary

Relevant, clear, us-focused

Learners say this course is engaging and informative with relevant content and clear lessons. One quality mentioned in reviews is the course's strong focus on the US and its aviation industry, which may be useful for some learners and less applicable for others.
Course focuses on the US aviation industry.
"Geared perhaps more towards the US, but certainly relevant to us in the EU."
"Although it was US-based I think this aviation roadmap and CARMA method will apply to all country's aviation industry."
Content is engaging and relevant.
"Very interesting and intriguing course, also very challenging."
"Am grateful for completion of this course everything was incredible and understandable."
Lessons are clear, detailed, and well-summarized
"All lectures/videos were a fantastic summary of the relevant readings provided - succinct and in-depth."
"The instructor is very clear and I understood everything."

Activities

Be better prepared before your course. Deepen your understanding during and after it. Supplement your coursework and achieve mastery of the topics covered in Cybersecurity Policy for Aviation and Internet Infrastructures with these activities:
Review CISSP: Certified Information Systems Security Professional Official Study Guide, 7th Edition
This book will serve as a rich reference to master principles of cybersecurity
Show steps
  • Identify the topic relevance to the course material
  • Read the book
  • Take notes
  • Review your notes
  • Take practice quizzes
Ethical Hacking and Penetration Testing Guide
This book will provide an in-depth understanding of ethical hacking and penetration testing
Show steps
  • Identify the topic relevance to the course material
  • Read the book
  • Take notes
  • Review your notes
  • Take practice quizzes
Create a blog post or article on cybersecurity
Write a blog post on cybersecurity to reinforce your understanding of the concepts
Browse courses on Cybersecurity
Show steps
  • Choose a relevant topic
  • Research and collect information
  • Develop an outline
  • Write the blog post
  • Publish and promote your blog post
Four other activities
Expand to see all activities and additional details
Show all seven activities
Follow a tutorial on how to use a cybersecurity tool
Follow a tutorial to enhance your cybersecurity skills
Browse courses on Cybersecurity
Show steps
  • Identify a relevant tutorial
  • Follow the tutorial
  • Practice using the tool
  • Document your experience
  • Share your findings
Build a home cybersecurity system
Apply the concepts of cybersecurity to build a home cybersecurity system
Browse courses on network security
Show steps
  • Design the system
  • Purchase the necessary equipment
  • Set up the system
  • Test the system
  • Document the system
Create a cybersecurity threat assessment report
Create a report to demonstrate your understanding of threat assessment
Browse courses on Cybersecurity
Show steps
  • Identify and prioritize risks
  • Analyze potential threats
  • Develop mitigation strategies
  • Write the report
  • Present the report
Attend a cybersecurity conference
Attend a conference to connect with other cybersecurity professionals
Browse courses on Cybersecurity
Show steps
  • Register for the conference
  • Identify a relevant conference
  • Attend the conference
  • Network with other attendees
  • Follow up with the attendees

Career center

Learners who complete Cybersecurity Policy for Aviation and Internet Infrastructures will develop knowledge and skills that may be useful to these careers:
Information Security Analyst
Information Security Analysts are responsible for protecting computer networks and systems from cyber attacks. They analyze and assess threats, develop security policies and procedures, and implement and maintain security controls. The Cybersecurity Policy for Aviation and Internet Infrastructures course provides a comprehensive overview of cybersecurity policies and practices that are essential for Information Security Analysts working in the aviation and Internet industries.
Cybersecurity Architect
Cybersecurity Architects design and implement security solutions to protect computer networks and systems from cyber attacks. They work with stakeholders to define security requirements, develop security architectures, and implement and maintain security controls. The Cybersecurity Policy for Aviation and Internet Infrastructures course provides Cybersecurity Architects with the knowledge and skills they need to develop and implement effective cybersecurity solutions for the aviation and Internet industries.
Cybersecurity Engineer
Cybersecurity Engineers implement and maintain security controls to protect computer networks and systems from cyber attacks. They work with stakeholders to identify security risks, develop and implement security solutions, and monitor and respond to security incidents. The Cybersecurity Policy for Aviation and Internet Infrastructures course provides Cybersecurity Engineers with the knowledge and skills they need to implement and maintain effective cybersecurity solutions for the aviation and Internet industries.
Network Security Engineer
Network Security Engineers design, implement, and maintain security controls to protect computer networks from cyber attacks. They work with stakeholders to identify security risks, develop and implement security solutions, and monitor and respond to security incidents. The Cybersecurity Policy for Aviation and Internet Infrastructures course provides Network Security Engineers with the knowledge and skills they need to design, implement, and maintain effective security solutions for the aviation and Internet industries.
Security Consultant
Security Consultants provide advice and guidance to organizations on how to protect their computer networks and systems from cyber attacks. They work with stakeholders to identify security risks, develop and implement security solutions, and monitor and respond to security incidents. The Cybersecurity Policy for Aviation and Internet Infrastructures course provides Security Consultants with the knowledge and skills they need to provide effective security consulting services to organizations in the aviation and Internet industries.
Security Auditor
Security Auditors assess the security of computer networks and systems to identify vulnerabilities and risks. They work with stakeholders to develop and implement security solutions, and monitor and respond to security incidents. The Cybersecurity Policy for Aviation and Internet Infrastructures course provides Security Auditors with the knowledge and skills they need to conduct effective security audits for organizations in the aviation and Internet industries.
Security Analyst
Security Analysts monitor and analyze security events to identify and respond to cyber attacks. They work with stakeholders to develop and implement security solutions, and monitor and respond to security incidents. The Cybersecurity Policy for Aviation and Internet Infrastructures course provides Security Analysts with the knowledge and skills they need to monitor and analyze security events for organizations in the aviation and Internet industries.
Cloud Security Engineer
Cloud Security Engineers design, implement, and maintain security controls to protect cloud-based applications and data. They work with stakeholders to identify security risks, develop and implement security solutions, and monitor and respond to security incidents. The Cybersecurity Policy for Aviation and Internet Infrastructures course provides Cloud Security Engineers with the knowledge and skills they need to design, implement, and maintain effective security solutions for cloud-based applications and data in the aviation and Internet industries.
Data Security Analyst
Data Security Analysts protect data from unauthorized access, use, disclosure, disruption, modification, or destruction. They work with stakeholders to identify data security risks, develop and implement data security solutions, and monitor and respond to data security incidents. The Cybersecurity Policy for Aviation and Internet Infrastructures course provides Data Security Analysts with the knowledge and skills they need to protect data from unauthorized access, use, disclosure, disruption, modification, or destruction in the aviation and Internet industries.
Information Security Manager
Information Security Managers oversee the security of computer networks and systems. They work with stakeholders to develop and implement security policies and procedures, and manage security incidents. The Cybersecurity Policy for Aviation and Internet Infrastructures course provides Information Security Managers with the knowledge and skills they need to oversee the security of computer networks and systems in the aviation and Internet industries.
Chief Information Security Officer
Chief Information Security Officers (CISOs) are responsible for the overall security of an organization's computer networks and systems. They work with stakeholders to develop and implement security policies and procedures, and manage security incidents. The Cybersecurity Policy for Aviation and Internet Infrastructures course provides CISOs with the knowledge and skills they need to develop and implement effective security solutions for their organizations in the aviation and Internet industries.
Risk Manager
Risk Managers identify, assess, and manage risks to an organization's computer networks and systems. They work with stakeholders to develop and implement risk management strategies, and monitor and respond to security incidents. The Cybersecurity Policy for Aviation and Internet Infrastructures course provides Risk Managers with the knowledge and skills they need to identify, assess, and manage risks to computer networks and systems in the aviation and Internet industries.
Compliance Manager
Compliance Managers ensure that an organization's computer networks and systems comply with applicable laws and regulations. They work with stakeholders to develop and implement compliance programs, and monitor and respond to compliance incidents. The Cybersecurity Policy for Aviation and Internet Infrastructures course provides Compliance Managers with the knowledge and skills they need to develop and implement effective compliance programs for organizations in the aviation and Internet industries.
IT Manager
IT Managers plan, implement, and manage IT systems and services for an organization. They work with stakeholders to identify IT needs, develop and implement IT solutions, and manage IT budgets. The Cybersecurity Policy for Aviation and Internet Infrastructures course provides IT Managers with the knowledge and skills they need to plan, implement, and manage secure IT systems and services for organizations in the aviation and Internet industries.
Network Administrator
Network Administrators manage and maintain computer networks. They work with stakeholders to identify network needs, develop and implement network solutions, and manage network budgets. The Cybersecurity Policy for Aviation and Internet Infrastructures course provides Network Administrators with the knowledge and skills they need to manage and maintain secure computer networks for organizations in the aviation and Internet industries.

Reading list

We've selected ten books that we think will supplement your learning. Use these to develop background knowledge, enrich your coursework, and gain a deeper understanding of the topics covered in Cybersecurity Policy for Aviation and Internet Infrastructures.
Provides a detailed explanation of the TCP/IP protocol suite, including topics such as network addressing, routing, and transport protocols.
This document from the Department of Homeland Security provides guidance on implementing CARMA, which is discussed in the course.
Provides a comprehensive overview of cryptography and network security, including topics such as encryption, authentication, and key management.
Provides a comprehensive overview of computer security, including topics such as security principles, threats, and countermeasures.
This ICAO publication provides an overview of cybersecurity risks in aviation and guidance on how to mitigate them.
Provides a comprehensive overview of cloud computing security, including topics such as cloud security models, threats, and countermeasures.
Provides a concise overview of ISO 27001, the international standard for information security management.
Provides a comprehensive overview of computer networks, including topics such as network architecture, protocols, and security.
While not specifically focused on aviation or internet infrastructure, this book provides a solid foundation in cloud security principles.

Share

Help others find this course page by sharing it with your friends and followers:

Similar courses

Here are nine courses similar to Cybersecurity Policy for Aviation and Internet Infrastructures.
Cybersecurity Policy for Water and Electricity...
Most relevant
Homeland Security & Cybersecurity Connection - It's Not...
Most relevant
Unified Defense: Expanding Security Consciousness to...
406: Information Securi
Introduction to air transportation and aviation management
Digital Shield: Cybersecurity for Data and System...
Introduction to Cybersecurity Foundations
Introduction to Software-Defined (SD) Branch
Designing Software-Defined Branch Infrastructures
Our mission

OpenCourser helps millions of learners each year. People visit us to learn workspace skills, ace their exams, and nurture their curiosity.

Our extensive catalog contains over 50,000 courses and twice as many books. Browse by search, by topic, or even by career interests. We'll match you to the right resources quickly.

Find this site helpful? Tell a friend about us.

Affiliate disclosure

We're supported by our community of learners. When you purchase or subscribe to courses and programs or purchase books, we may earn a commission from our partners.

Your purchases help us maintain our catalog and keep our servers humming without ads.

Thank you for supporting OpenCourser.

© 2016 - 2024 OpenCourser