We may earn an affiliate commission when you visit our partners.
Course image
Dr. Humayun Zafar, CEH, CISM, CRISC, PCIP

This course is designed to introduce students, working professionals and the community to the exciting field of cybersecurity. Throughout the MOOC, participants will engage in community discourse and online interaction. Participants will gain knowledge and understanding of cybersecurity and its domains. They will engage with expertly produced videos, gain insight from industry experts, participate in knowledge assessments, practice assessing their environmental awareness, and gain access to materials that address governance and risk management, compliance, business continuity and disaster recovery, cryptography, software development security, access control, network security, security architecture, security operations, and physical and environmental security. Learning will be assessed using strategies aligned to knowledge and understanding.

Read more

This course is designed to introduce students, working professionals and the community to the exciting field of cybersecurity. Throughout the MOOC, participants will engage in community discourse and online interaction. Participants will gain knowledge and understanding of cybersecurity and its domains. They will engage with expertly produced videos, gain insight from industry experts, participate in knowledge assessments, practice assessing their environmental awareness, and gain access to materials that address governance and risk management, compliance, business continuity and disaster recovery, cryptography, software development security, access control, network security, security architecture, security operations, and physical and environmental security. Learning will be assessed using strategies aligned to knowledge and understanding.

You do not need prior experience in IT security to do well in this course. All you need is a willingness to learn. We will point you to relevant open and free resources to assist you.

At the end of this course, you will have the option of applying for undergraduate level course credit at Kennesaw State University (dependent on admission to Kennesaw State University as a degree seeking or a non-degree seeking student). More information is available in final module "Receive Course (undergraduate) Credit at Kennesaw State University".

Enroll now

What's inside

Syllabus

Welcome and Course Overview
Checkout our marquee speaker. She's the Chief Privacy Officer at Coca Cola.
Introduction to Security, Access Control, and Software Development Security
Read more
In this module we cover some of the fundamentals of security that will assist you throughout the course. We will then introduce you to two domains of cyber security: access control and software development security. Focus will be on areas such as confidentiality, integrity, and availability, as well secure software development techniques.
Business Continuity and Disaster Recovery Planning and Cryptography
In this module we are going to delve a little deeper into cyber security by covering business continuity and disaster recovery planning and cryptography. Learners will be exposed to what a disruptive event is and how the federal government through agencies such as FEMA handles disasters. We will also covers encryption and decryption and the various techniques used.
Information Security Governance and Risk Management & Legal, Regulations, Investigations, and Compliance
In this module we are going to cover some of the non-technical topics associated to cyber security: Information security governance and risk management and legal, regulations, investigations, and compliance. It is important to realize, that non-technical does not mean easy, or not important. In fact, I would like to argue that they are more important that the technical side of cyber security.
Operations Security & Physical and Environmental Security
In this module we are going to cover what amount to some of the more intuitive parts of cybersecurity: operations security and physical and environmental security. Learners will understand operations security from a competitor/enemy/hacker’s viewpoint and then develop and apply countermeasures accordingly. Learners will also be exposed to electric power issues such as brownouts, fire detection and suppression, and HVAC.
Security Architecture and Design & Telecommunications and Network Security
In this module we are going to cover some of the most technical and comprehensive topics that cyber security has to offer as we look at Security Architecture and Design and Telecommunications and Network Security. Learners will be exposed to security models such as Bell LaPadula, Clark-Wilson, Mandatory Access Control (MAC), Discretionary Access Control (DAC), Role-Based Access Control (RBAC), and Access Matrix. We will also describe the Open Systems Interconnect (OSI) model and its seven layers.
Receive Undergraduate Course Credit at Kennesaw State University
In this module we provide details about leveraging this MOOC for credit at the undergraduate level at Kennesaw State University. It is very important that learners follow directions carefully.

Good to know

Know what's good
, what to watch for
, and possible dealbreakers
Introduces fundamental concepts and their application in cybersecurity domains
Provides opportunities for online interaction and engagement with others interested in cybersecurity
Covers a wide range of cybersecurity topics, including governance, risk management, compliance, and physical security
Led by experienced instructors in the cybersecurity field
Offers the option of earning undergraduate course credit at Kennesaw State University

Save this course

Save Cybersecurity and Its Ten Domains to your list so you can find it easily later:
Save

Reviews summary

Cybersecurity and its ten domains

Learners say this course is largely positive, providing engaging assignments and covering cybersecurity's many features. The course thoroughly goes over cybersecurity's ten domains. While there may be difficult exams and the material might be extensive, most students agree that this course is perfect for beginners in the field. Students also mention that the course's videos are short, and it mostly features readings from provided links.
Challenging but fair assessments that test understanding of concepts.
"The final quiz has a bug. It asks the same question twice and once the same answer is accepted as correct and then as incorrect."
"The quizzes were also apt to test the knowledge gathered"
"The quizzes at the end of each week really helps to do self assessment."
Extensive and informative readings with many useful links.
"The course gives a deep understanding of the different kind of risk varying from security risk to a business or organisation to risks which could potentially lead to disruption of the business or organisation."
"This course was very informative and gave me great insight about cyber security and why it is so important."
"The course was very interesting. I started getting interested in cybersecuryty not so long ago and I realized that it is very important in particular in these times."
"Great course to start your carrier in cybersecurity and to know which domains are available in cybersecurity fields."
Well-structured course with a logical progression of topics.
"This course was very well structured, very informative and organized in a structured manner that is easy to follow."
"Organized in a systematic manner and easy to understand."
"The course has given me knowledge that I didn't had before. Thank you!"
"It was a great course where I have learnt many things about the Cyber security Domain."
Comprehensive coverage of cybersecurity's ten domains.
"The course gives a deep understanding of the different kind of risk varying from security risk to a business or organisation to risks which could potentially lead to disruption of the business or organisation."
"This course was very informative and gave me great insight about cyber security and why it is so important."
"The course was very interesting. I started getting interested in cybersecuryty not so long ago and I realized that it is very important in particular in these times."
"Great course to start your carrier in cybersecurity and to know which domains are available in cybersecurity fields."
Excellent resource for beginners in cybersecurity.
"This course is really helpful and it cover many thing in general . Thanks you"
"This course was highly instructive. The instructors did very wonderful work."
"Thank you for this course. Thank you for the learning opportunity to learn from the best."
"It was a great experience learning here."
Little to no instructor involvement and support.
"The instructor is not the instructor, he just appear in 1 video of 2 minute."
"The instructor cannot be contacted for questions, links problems or other comments."
"I started on this course, and left it after browsing through the course materials for the following reasons:No videos by the instructor."

Activities

Be better prepared before your course. Deepen your understanding during and after it. Supplement your coursework and achieve mastery of the topics covered in Cybersecurity and Its Ten Domains with these activities:
Practice Password Management
Review strong password creation and management techniques to enhance your understanding of access control.
Show steps
  • Review password strength guidelines
  • Practice creating complex and unique passwords
  • Explore password manager tools and their features
Review prior cybersecurity knowledge
Build a foundation for the course by refreshing key cybersecurity principles.
Browse courses on Cybersecurity
Show steps
  • Look over previous work in the field that you're familiar with.
  • Re-read a textbook you used in a previous course.
  • Go over notes from a previous cybersecurity course.
  • Review practice questions used in past cyber exams for your classes.
Engage in peer learning groups
Collaborate with peers to enhance understanding and perspectives.
Show steps
  • Form or join a study group with classmates.
  • Set regular meeting times and study topics.
  • Facilitate discussions, share knowledge, and solve problems together.
Eight other activities
Expand to see all activities and additional details
Show all 11 activities
Follow tutorials on access control principles
Solidify understanding of access control mechanisms.
Browse courses on Access Control
Show steps
  • Search online for tutorials on access control principles.
  • Follow step-by-step instructions to implement access control in a simulated environment.
  • Experiment with different access control models and their implications.
Follow Security Tutorials
Engage in guided video tutorials on topics such as software development security or cryptography to gain practical insights.
Show steps
  • Identify reputable sources for security tutorials
  • Select tutorials that align with course topics
  • Follow the tutorials step-by-step and complete the exercises
Read 'Domain 7: Cloud Computing' book
Enhance understanding of cloud computing in cybersecurity.
Show steps
  • Read the assigned chapters related to Domain 7: Cloud Computing.
  • Take notes emphasizing key concepts such as cloud architecture, security models, and compliance.
  • Summarize findings from the book into a study guide.
Practice network security drills
Develop proficiency in network security configuration and troubleshooting.
Browse courses on network security
Show steps
  • Set up a simulated network environment.
  • Configure network security devices such as firewalls and intrusion detection systems.
  • Run network security drills to test and refine configurations.
  • Analyze logs and troubleshoot network security issues.
Attend industry conferences and meetups
Expand professional network and stay updated on industry trends.
Show steps
  • Research upcoming cybersecurity industry conferences and meetups.
  • Register and attend events.
  • Network with speakers, attendees, and potential mentors.
  • Gather information on the latest cybersecurity technologies and best practices.
Solve Cybersecurity Practice Problems
Test your understanding of cybersecurity concepts through practice problems and simulations, focusing on areas like risk management and network security.
Show steps
  • Join online platforms for cybersecurity challenges
  • Subscribe to cybersecurity newsletters with practice exercises
  • Work through practice exams or quizzes
Design and implement a cybersecurity incident response plan
Apply cybersecurity principles to a practical project, reinforcing incident response best practices.
Browse courses on Incident Response
Show steps
  • Develop a comprehensive cybersecurity incident response plan.
  • Implement the plan in a simulated environment.
  • Test the effectiveness of the plan through simulated incidents.
  • Evaluate and refine the plan based on the results of testing.
Create a blog or article on a cybersecurity topic
Deepen understanding by explaining cybersecurity concepts to others.
Show steps
  • Choose a specific cybersecurity topic to focus on.
  • Research and gather information from reliable sources.
  • Develop an outline and write the blog or article.
  • Proofread and edit for clarity and accuracy.

Career center

Learners who complete Cybersecurity and Its Ten Domains will develop knowledge and skills that may be useful to these careers:
Chief Information Security Officer
A Chief Information Security Officer is responsible for developing, implementing and enforcing an organization's information security strategy. The course's comprehensive treatment of the field, including modules on cryptography and security architecture, can help you lay the foundation for a successful career in this role.
Information Security Analyst
An Information Security Analyst identifies, assesses, and mitigates security risks to an organization's information systems. By gaining knowledge from this course, particularly in areas such as access control and security governance, you can enhance your ability to protect sensitive information.
Cybersecurity Engineer
A Cybersecurity Engineer designs, implements, and maintains security systems to protect organizations from cyber threats. The course provides a solid grounding in the technical aspects of cybersecurity, including network security, cryptography, and security architecture, which are essential for this role.
Penetration Tester
A Penetration Tester evaluates an organization's security systems by simulating cyberattacks. The course explores various aspects of security, such as access control, software development security, and security operations, which can help you develop the skills needed to identify vulnerabilities and improve security measures.
Security Architect
A Security Architect designs and implements security solutions for organizations. The course covers topics such as security architecture and design, network security, and cryptography, which are essential for understanding the principles and best practices of security architecture.
Compliance Manager
A Compliance Manager ensures that an organization complies with relevant laws and regulations related to information security. The course's modules on legal, regulations, investigations, and compliance provide valuable insights into the regulatory landscape, helping you develop the knowledge needed to effectively manage compliance in this field.
Risk Manager
A Risk Manager identifies, assesses, and mitigates risks to an organization's information systems. The course covers topics such as information security governance and risk management, as well as business continuity and disaster recovery planning, which are essential for understanding and managing risks in cybersecurity.
Cloud Security Engineer
A Cloud Security Engineer secures cloud computing environments. The course's focus on access control, software development security, and network security provides valuable knowledge for understanding the challenges and best practices of securing cloud environments.
Incident Responder
An Incident Responder handles security breaches and incidents. The course provides a comprehensive overview of cybersecurity, including modules on security operations, cryptography, and legal, regulations, investigations, and compliance, which can help you develop the skills needed to effectively respond to and manage security incidents.
Security Consultant
A Security Consultant provides advice and guidance to organizations on cybersecurity matters. The course covers various aspects of cybersecurity, including governance, risk management, compliance, and security architecture, which can help you develop the knowledge and expertise needed to provide valuable insights to clients.
Network Administrator
A Network Administrator maintains and manages computer networks. The course's modules on network security, security operations, and telecommunications provide valuable knowledge for understanding and managing the security of computer networks.
Systems Administrator
A Systems Administrator maintains and manages computer systems. The course's modules on software development security, security operations, and cryptography provide valuable knowledge for understanding and securing computer systems.
Forensic Computer Analyst
A Forensic Computer Analyst investigates and analyzes computer systems to uncover evidence in legal cases. The course's modules on legal, regulations, investigations, and compliance provide valuable knowledge for understanding the legal and technical aspects of forensic computer analysis.
Cybersecurity Auditor
A Cybersecurity Auditor evaluates the effectiveness of an organization's cybersecurity controls. The course covers various aspects of cybersecurity, including governance, risk management, compliance, and security architecture, which can help you develop the knowledge and skills needed to effectively audit cybersecurity controls.
Cybersecurity Researcher
A Cybersecurity Researcher investigates and analyzes cybersecurity threats and trends. The course provides a comprehensive overview of cybersecurity, including modules on cryptography, network security, and security architecture, which can help you develop the knowledge and skills needed to conduct research in this field.

Reading list

We've selected eight books that we think will supplement your learning. Use these to develop background knowledge, enrich your coursework, and gain a deeper understanding of the topics covered in Cybersecurity and Its Ten Domains.
Provides a comprehensive overview of the cybersecurity landscape. It covers topics such as the history of cybersecurity, the current state of the threat landscape, and the future of cybersecurity. It valuable resource for anyone who wants to learn more.
Provides a comprehensive guide to cybersecurity best practices. It covers topics such as network security, system security, and incident response. It valuable resource for anyone who wants to learn more about how to protect their systems and networks from attack.
Provides a comprehensive overview of cryptography and network security. It covers topics such as the basics of cryptography, network security protocols, and system security. It valuable resource for anyone who wants to learn more about the technical underpinnings of cybersecurity.
Provides a comprehensive overview of cloud security. It covers topics such as the security of cloud computing platforms, the security of cloud applications, and the security of cloud data. It valuable resource for anyone who wants to learn more about how to protect their cloud-based systems and data.
Provides a comprehensive overview of incident response and computer forensics. It covers topics such as the incident response lifecycle, evidence collection and preservation, and computer forensics techniques. It valuable resource for anyone who wants to learn more about how to respond to and investigate cyberattacks.
Provides insights into the psychology of security breaches. It covers topics such as social engineering, phishing, and malware. It valuable resource for anyone who wants to learn more about how to protect themselves from these types of attacks.
Provides a hands-on guide to malware analysis. It covers topics such as malware detection, analysis, and remediation. It valuable resource for anyone who wants to learn more about how to protect their systems from malware.

Share

Help others find this course page by sharing it with your friends and followers:

Similar courses

Here are nine courses similar to Cybersecurity and Its Ten Domains.
Try It: Cybersecurity Basics
Try It: Cybersecurity Basics
Try It: Cybersecurity Basics
Cybersecurity Architecture
Security Architecture and Engineering: Physical Security...
Cybersecurity Compliance Framework & System Administration
Cybersecurity Fundamentals - Become a Security Expert
Network Security & Database Vulnerabilities
Homeland Security & Cybersecurity Connection - It's Not...
Our mission

OpenCourser helps millions of learners each year. People visit us to learn workspace skills, ace their exams, and nurture their curiosity.

Our extensive catalog contains over 50,000 courses and twice as many books. Browse by search, by topic, or even by career interests. We'll match you to the right resources quickly.

Find this site helpful? Tell a friend about us.

Affiliate disclosure

We're supported by our community of learners. When you purchase or subscribe to courses and programs or purchase books, we may earn a commission from our partners.

Your purchases help us maintain our catalog and keep our servers humming without ads.

Thank you for supporting OpenCourser.

© 2016 - 2024 OpenCourser