We may earn an affiliate commission when you visit our partners.
Course image
Charles Harry

Cybersecurity affects everyone, including in the delivery of basic products and services. If you or your organization want to better understand how to address your cybersecurity, this is the course for you and your colleagues to take -- from seasoned professionals to your non-technical colleagues.

Your instructor, Dr. Charles Harry, has served on the front lines with the NSA (National Security Agency) and as an expert advising corporate and institutional leaders on managing cybersecurity risk. And he brings a rare and engaging perspective to help you learn cybersecurity from the ground up.

Read more

Cybersecurity affects everyone, including in the delivery of basic products and services. If you or your organization want to better understand how to address your cybersecurity, this is the course for you and your colleagues to take -- from seasoned professionals to your non-technical colleagues.

Your instructor, Dr. Charles Harry, has served on the front lines with the NSA (National Security Agency) and as an expert advising corporate and institutional leaders on managing cybersecurity risk. And he brings a rare and engaging perspective to help you learn cybersecurity from the ground up.

A Strategic Approach to Cybersecurity provides a framework for understanding the interdependency of private and public entities and the complex systems affecting you and your organization, toward improving critical cybersecurity infrastructure impacting your security. While not its prerequisite, it builds on Dr. Harry’s first course, Cybersecurity for Everyone, with over 100,000 learners globally and growing, which AI Time Journal called “next-level” and highlighted as the top university cybersecurity offering online this year. The course lays the groundwork to understand and explore the key issues facing leaders and policy makers attempting to manage the problem of cybersecurity, from its technical foundations to the domestic and international policy considerations surrounding governance, privacy, and risk management, to applications for achieving the goals of an enterprise, an institution, or a nation. This course is designed for students with some or no background in information technology, whether a novice or active in the cybersecurity field (engineers and computer scientists will learn the broader context and business aspects of cybersecurity), and will provide the principles to understand the current debates shaping a rapidly evolving security landscape.

Enroll now

What's inside

Syllabus

Defining a Strategic Approach to Cybersecurity (Week 1)
Private Sector Context - Part 1 (Week 2)
Private Sector Context - Part 2 (Week 3)
Read more
Public Sector Context: Critical Infrastructure and National Response (Week 4)
Protecting National Critical Functions (Week 5)
From Device to National Critical Function: Identifying Strategic Consequence (Week 6)

Good to know

Know what's good
, what to watch for
, and possible dealbreakers
Suitable for both beginners and experienced professionals, as well as non-technical personnel
Taught by an experienced expert in cybersecurity with proven experience both in the private and public sectors
Provides a structured framework for understanding cybersecurity challenges
Covers the topic from technical foundations to policy considerations providing a comprehensive view
May prove useful for policy makers and leaders seeking to address cybersecurity issues
Builds on a previous course on Cybersecurity for Everyone, expanding upon its content

Save this course

Save A Strategic Approach to Cybersecurity to your list so you can find it easily later:
Save

Activities

Be better prepared before your course. Deepen your understanding during and after it. Supplement your coursework and achieve mastery of the topics covered in A Strategic Approach to Cybersecurity with these activities:
Review Computer Networking Fundamentals
A solid grasp of computer networking fundamentals provides a foundation building block for this course.
Browse courses on Computer Networking
Show steps
  • Review OSI model and TCP/IP model
  • Go through basic network configurations
  • Configure basic network devices
Follow Industry Security Blogs
Staying up-to-date with the latest cybersecurity trends and innovations can be helpful throughout the course.
Browse courses on Cybersecurity
Show steps
  • Identify reputable cybersecurity blogs
  • Subscribe to blogs and follow their content
Review Cybersecurity Basics
Establishes a solid understanding of core cybersecurity concepts and terminology, which will serve as the foundation for the rest of the course.
Show steps
  • Read through the introductory chapter of a cybersecurity textbook or online resource.
  • Review your notes from previous cybersecurity courses or workshops.
  • Take a practice quiz or assessment to test your knowledge of basic cybersecurity concepts.
Five other activities
Expand to see all activities and additional details
Show all eight activities
Practice Cybersecurity Exercises
Hands-on exercises help you develop your cybersecurity skills.
Browse courses on Cybersecurity
Show steps
  • Set up a simulated network environment
  • Conduct vulnerability assessments
  • Perform penetration testing
Engage in Peer Discussion Groups
Connecting with other students allows you to share knowledge, learn from different perspectives, and gain insights.
Browse courses on Cybersecurity
Show steps
  • Join online forums or discussion groups dedicated to cybersecurity
  • Participate in discussions, ask questions, and share your knowledge
Security Scenario Analysis
Develops critical thinking and problem-solving skills in the context of cybersecurity incidents and scenarios, enhancing your ability to make informed decisions in real-world situations.
Show steps
  • Identify and analyze a real-world cybersecurity incident or scenario.
  • Develop a mitigation plan and response strategy.
  • Present your findings and recommendations to a peer or mentor for feedback.
Solve practice problems on cybersecurity principles
Practice solving problems on cybersecurity principles to reinforce your understanding of the key concepts and strengthen your problem-solving skills.
Browse courses on Cybersecurity Principles
Show steps
  • Identify a reputable source for practice problems.
  • Solve the problems independently.
  • Review your solutions and identify any areas where you need improvement.
Attend a Cybersecurity Workshop
Provides hands-on experience and in-depth knowledge of specific cybersecurity topics, complementing the theoretical concepts covered in the course.
Browse courses on Cybersecurity Awareness
Show steps
  • Research and select a cybersecurity workshop that aligns with your interests or career goals.
  • Attend the workshop and actively participate in the activities and discussions.
  • Apply the knowledge and skills gained from the workshop to your coursework and practical projects.

Career center

Learners who complete A Strategic Approach to Cybersecurity will develop knowledge and skills that may be useful to these careers:
Information Security Analyst
Information Security Analysts identify and neutralize threats and vulnerabilities within an organization's computer systems. They also develop and implement security policies and procedures to protect against unauthorized access. The course "A Strategic Approach to Cybersecurity" provides a comprehensive overview of cybersecurity principles and best practices, helping Information Security Analysts stay up-to-date with the latest threats and develop effective strategies to protect their organizations. The course's focus on both private and public sector contexts also gives Information Security Analysts a broad understanding of the challenges and opportunities in this field.
Cybersecurity Consultant
Cybersecurity Consultants provide organizations with expert advice and guidance on cybersecurity risks and how to mitigate them. They help organizations develop and implement cybersecurity strategies, policies, and procedures, and they also conduct security audits and assessments. The course "A Strategic Approach to Cybersecurity" provides Cybersecurity Consultants with a deep understanding of the cybersecurity landscape and the latest threats and trends. The course also covers the legal and regulatory aspects of cybersecurity, which is essential for Cybersecurity Consultants who advise organizations on compliance.
Security Architect
Security Architects design and implement security solutions for organizations. They work with business leaders to understand their security needs and develop solutions that meet those needs. Security Architects also stay up-to-date on the latest security technologies and trends. The course "A Strategic Approach to Cybersecurity" provides Security Architects with a comprehensive overview of cybersecurity principles and best practices. The course also covers the latest security technologies and trends, helping Security Architects develop and implement effective security solutions for their organizations.
Ethical Hacker
Ethical Hackers, also known as penetration testers, are responsible for testing the security of computer systems and networks. They use their skills to identify vulnerabilities that could be exploited by attackers. The course "A Strategic Approach to Cybersecurity" provides Ethical Hackers with a deep understanding of cybersecurity principles and best practices. The course also covers the latest security technologies and trends, helping Ethical Hackers stay up-to-date with the latest threats and develop effective strategies to protect their organizations.
Incident Responder
Incident Responders are responsible for responding to cybersecurity incidents and breaches. They work to contain the damage and restore normal operations as quickly as possible. The course "A Strategic Approach to Cybersecurity" provides Incident Responders with a comprehensive overview of cybersecurity principles and best practices. The course also covers the latest security technologies and trends, helping Incident Responders stay up-to-date with the latest threats and develop effective strategies to respond to incidents.
Cybersecurity Policy Analyst
Cybersecurity Policy Analysts develop and implement cybersecurity policies for organizations. They work with business leaders to understand their security needs and develop policies that meet those needs. Cybersecurity Policy Analysts also stay up-to-date on the latest cybersecurity laws and regulations. The course "A Strategic Approach to Cybersecurity" provides Cybersecurity Policy Analysts with a comprehensive overview of cybersecurity principles and best practices. The course also covers the latest cybersecurity laws and regulations, helping Cybersecurity Policy Analysts develop and implement effective cybersecurity policies for their organizations.
Cryptographer
Cryptographers develop and implement cryptographic algorithms and protocols to protect data from unauthorized access. They work with a variety of technologies, including cryptography, mathematics, and computer science. The course "A Strategic Approach to Cybersecurity" provides Cryptographers with a deep understanding of cybersecurity principles and best practices. The course also covers the latest cryptography technologies and trends, helping Cryptographers develop and implement effective cryptographic solutions for their organizations.
Cybersecurity Engineer
Cybersecurity Engineers design, implement, and maintain cybersecurity systems and networks. They work with a variety of technologies, including firewalls, intrusion detection systems, and encryption. The course "A Strategic Approach to Cybersecurity" provides Cybersecurity Engineers with a comprehensive overview of cybersecurity principles and best practices. The course also covers the latest cybersecurity technologies and trends, helping Cybersecurity Engineers develop and implement effective cybersecurity solutions for their organizations.
Cloud Security Engineer
Cloud Security Engineers design and implement security solutions for cloud computing environments. They work with a variety of technologies, including cloud computing platforms, security tools, and access control. The course "A Strategic Approach to Cybersecurity" provides Cloud Security Engineers with a comprehensive overview of cybersecurity principles and best practices. The course also covers the latest cloud security technologies and trends, helping Cloud Security Engineers develop and implement effective security solutions for their organizations.
Risk Manager
Risk Managers identify, assess, and mitigate risks to organizations. They work with a variety of stakeholders, including business leaders, IT professionals, and legal counsel. The course "A Strategic Approach to Cybersecurity" provides Risk Managers with a comprehensive overview of cybersecurity principles and best practices. The course also covers the latest cybersecurity laws and regulations, helping Risk Managers develop and implement effective risk management strategies for their organizations.
Chief Information Security Officer (CISO)
CISOs are responsible for the overall security of their organizations. They work with business leaders to understand their security needs and develop strategies to meet those needs. CISOs also stay up-to-date on the latest cybersecurity threats and trends. The course "A Strategic Approach to Cybersecurity" provides CISOs with a comprehensive overview of cybersecurity principles and best practices. The course also covers the latest cybersecurity laws and regulations, helping CISOs develop and implement effective cybersecurity strategies for their organizations.
Compliance Analyst
Compliance Analysts ensure that organizations comply with cybersecurity laws and regulations. They work with a variety of stakeholders, including business leaders, IT professionals, and legal counsel. The course "A Strategic Approach to Cybersecurity" provides Compliance Analysts with a comprehensive overview of cybersecurity principles and best practices. The course also covers the latest cybersecurity laws and regulations, helping Compliance Analysts develop and implement effective compliance programs for their organizations.
Security Analyst
Security Analysts monitor and analyze security events and data. They work with a variety of technologies, including security information and event management (SIEM) systems, intrusion detection systems, and log management tools. The course "A Strategic Approach to Cybersecurity" provides Security Analysts with a comprehensive overview of cybersecurity principles and best practices. The course also covers the latest cybersecurity technologies and trends, helping Security Analysts develop and implement effective security monitoring and analysis solutions for their organizations.
Penetration Tester
Penetration Testers, also known as ethical hackers, are responsible for testing the security of computer systems and networks. They use their skills to identify vulnerabilities that could be exploited by attackers. The course "A Strategic Approach to Cybersecurity" provides Penetration Testers with a deep understanding of cybersecurity principles and best practices. The course also covers the latest security technologies and trends, helping Penetration Testers develop and implement effective security testing strategies for their organizations.
Malware Analyst
Malware Analysts investigate and analyze malware, including viruses, worms, and Trojans. They work with a variety of technologies, including malware analysis tools, sandboxes, and debuggers. The course "A Strategic Approach to Cybersecurity" provides Malware Analysts with a comprehensive overview of cybersecurity principles and best practices. The course also covers the latest malware analysis technologies and trends, helping Malware Analysts develop and implement effective malware analysis strategies for their organizations.

Reading list

We've selected 12 books that we think will supplement your learning. Use these to develop background knowledge, enrich your coursework, and gain a deeper understanding of the topics covered in A Strategic Approach to Cybersecurity.
Provides a comprehensive overview of cybersecurity, covering topics such as risk management, incident response, and business continuity. It valuable resource for anyone looking to gain a deeper understanding of cybersecurity.
This classic work on military strategy has been applied to a wide range of fields, including cybersecurity. It provides valuable insights into the nature of conflict and how to achieve victory.
Provides a comprehensive overview of network security monitoring. It valuable resource for anyone looking to learn more about this important topic.
Provides a comprehensive overview of computer security. It valuable resource for anyone looking to learn more about this important topic.
Provides a comprehensive overview of cybersecurity for beginners. It valuable resource for anyone looking to learn more about this important topic.
Classic work of cybersecurity literature. It tells the true story of how Clifford Stoll tracked down a hacker who was stealing sensitive information from a government computer system.
Memoir by Kevin Mitnick, one of the most famous hackers in the world. It provides a fascinating insight into the mind of a hacker and the challenges of cybersecurity.
Tells the story of the Stuxnet worm, which is believed to be the first cyberweapon ever used in warfare.
Provides a comprehensive overview of the cybersecurity threats facing the United States. It valuable resource for anyone looking to understand the challenges of cybersecurity.
Provides a comprehensive overview of threat modeling. It valuable resource for anyone looking to learn more about this important topic.
Provides a comprehensive overview of web application security. It valuable resource for anyone looking to learn more about this important topic.

Share

Help others find this course page by sharing it with your friends and followers:

Similar courses

Here are nine courses similar to A Strategic Approach to Cybersecurity.
Cybersecurity for Everyone
Most relevant
Cybersecurity Roles and Operating System Security
Most relevant
Real-World Ethical Hacking: Hands-on Cybersecurity
Most relevant
Basic Network and Database Security
Cybersecurity Compliance Framework & System Administration
Cybersecurity Compliance and System Administration
Network Security & Database Vulnerabilities
Cybersecurity Roles, Processes & Operating System Security
Cyber Security Essentials: Your Role in Protecting the...
Our mission

OpenCourser helps millions of learners each year. People visit us to learn workspace skills, ace their exams, and nurture their curiosity.

Our extensive catalog contains over 50,000 courses and twice as many books. Browse by search, by topic, or even by career interests. We'll match you to the right resources quickly.

Find this site helpful? Tell a friend about us.

Affiliate disclosure

We're supported by our community of learners. When you purchase or subscribe to courses and programs or purchase books, we may earn a commission from our partners.

Your purchases help us maintain our catalog and keep our servers humming without ads.

Thank you for supporting OpenCourser.

© 2016 - 2024 OpenCourser