We may earn an affiliate commission when you visit our partners.
Course image
Dr. Humayun Zafar, CEH, CISM, CRISC, PCIP

This course is for you if you are interested in transitioning toward a managerial role in cybersecurity and mobility. Through interviews with industry experts in this area, you will be able to analyze innovations powering the rapid spread of information technology and how they present new challenges for protecting data. For example, mobile devices increase convenience but often bypass traditional security measures. After this course, you will be able to describe how the nature of the threat evolves, as culprits employ a burgeoning set of sophisticated tools to take advantage of our growing reliance on networks for critical-data exchange.

Read more

This course is for you if you are interested in transitioning toward a managerial role in cybersecurity and mobility. Through interviews with industry experts in this area, you will be able to analyze innovations powering the rapid spread of information technology and how they present new challenges for protecting data. For example, mobile devices increase convenience but often bypass traditional security measures. After this course, you will be able to describe how the nature of the threat evolves, as culprits employ a burgeoning set of sophisticated tools to take advantage of our growing reliance on networks for critical-data exchange.

If you want to pursue a career in the public sector, the stakes are high as well. The proliferation of hackers, inevitable human errors, bring-your-own-device (BYOD) initiatives, and the ever-broadening need to share information weigh heavily on government and education organizations, and consume substantial resources. The Pentagon, for example, has proposed to spend $23 billion on network security initiatives through 2018. This sounds like a large sum, until you consider the scope and importance of the U.S. government information resources this investment must protect.

After completing the course modules you will be able to explain how yesterday’s prevention strategies are no longer adequate for stopping advanced, targeted attacks. Effective cybersecurity must be multi-dimensional and tiered, as threats can originate from virtually anywhere, target numerous levels of an organization, and sometimes persist for months or years before an information security staff is aware of an attack or breach. Therefore securing networks requires a holistic approach that incorporates several elements.

Enroll now

What's inside

Syllabus

Welcome to the Course!
Welcome! In this module, you will be introduced to cybersecurity, mobility, and to the organization for this course. You will also see Chris and Mandy from SAP for the first time. They will be with us throughout the course. At the end of the module, you will have a chance to gauge your incoming knowledge of some of the concepts that will be presented in this course. If you struggle to answer any of the questions in this quiz, that's good! That means this course will be a good fit for you, where you will learn these answers and more! Also, all videos in this course have embedded quizzes. Hope you enjoy the learning process.
Read more
Mobility Inc.
In this module you will be exposed to everything that is mobility. You will learn that mobility is not just about smartphones and tablets. In the context of the Internet of Things, it has become a much broader concept. You will also be introduced to how the entire global workforce trend toward mobility changes the way businesses operate.
Cybersecurity
In this module we will cover issues pertaining to cybersecurity and its relevance in today’s connected world. You will learn how mobility has been a true game changer in relation to the cyber realm. Corporate IT boundaries are no longer constrained to a building. Increasingly, more and more people have the capacity to connect remotely using various means. This absolutely has cybersecurity implications.
What's Next?
In this module we will cover areas that point to the future of cybersecurity and mobility. Mobility will continue to evolve as will IoT and things that are not even on our radar presently. For that reason you will be introduced to the Gartner Hype Cycle, which will provide you with a view industry usually has about various technologies and how they may fare in the long term.

Good to know

Know what's good
, what to watch for
, and possible dealbreakers
Examines the vulnerabilities that persist in the wake of traditional and legacy cybersecurity strategies
Addresses the challenges of protecting data in an increasingly mobile and interconnected world
Explores the evolving nature of threats and the need for a multi-dimensional approach to cybersecurity
Provides insights from industry experts into the latest innovations and trends in cybersecurity and mobility
Taught by certified instructors with extensive experience in cybersecurity and mobility

Save this course

Save Cybersecurity and Mobility to your list so you can find it easily later:
Save

Reviews summary

Well-received course: cybersecurity knowledge

According to students, Cybersecurity and Mobility has engaging assignments and informative readings. Great Course with meaningful course content for beginners to learn basics of cyber security and mobility. Learners remark that this is a good course for those with little to no prior knowledge of cybersecurity.
Course has engaging assignments and informative readings
"The quizzes and videos are very good, but the reading materials are very lengthy."
"I liked the course and it's really interesting, but some information is outdated."
"Nice and easy explain this topic"
Informative and very interesting course content
"good to learn, thank u all"
"very interesting and useful"
"good way to time spennt and learn new thing"
Good course for beginners to learn basics of cyber security and mobility
"This course is highly recommended for a person willing to learn the basics of cybersecurity."
"Learnt the very basics of cybersecurity and mobility."
"Meaningful course for initial understanding"

Activities

Be better prepared before your course. Deepen your understanding during and after it. Supplement your coursework and achieve mastery of the topics covered in Cybersecurity and Mobility with these activities:
Compile a list of cybersecurity tools
Gathering and organizing a list of cybersecurity tools will help you become familiar with the different tools available and their functionalities.
Browse courses on Cybersecurity Tools
Show steps
  • Identify different categories of cybersecurity tools
  • Research and gather information about each tool
  • Create a spreadsheet or document to organize your findings
Show all one activities

Career center

Learners who complete Cybersecurity and Mobility will develop knowledge and skills that may be useful to these careers:
IT Project Manager
IT Project Managers plan, execute, and manage IT projects. This course can provide you with a solid foundation in cybersecurity and mobility, giving you the skills to effectively manage cybersecurity projects and initiatives.
Information Security Analyst
Information Security Analysts install and oversee security measures for computer and information systems. In this role, you will implement best practices to protect data from internal and external threats to maintain network integrity. This course can help build a strong foundation for this career path. You will learn about cybersecurity, its relevance in today’s connected world, and how mobility has changed the cyber realm.
Risk Analyst
Risk Analysts identify, assess, and mitigate risks to an organization. This course can provide you with a solid foundation in cybersecurity and mobility, giving you the skills to effectively identify, assess, and mitigate cybersecurity risks.
Cybersecurity Analyst
Cybersecurity Analysts monitor and analyze security events and incidents. This course can provide you with a solid foundation in cybersecurity and mobility, giving you the skills to effectively monitor, analyze, and respond to security events and incidents.
Network Security Engineer
Network Security Engineers design, implement, and maintain network security systems. This course can provide you with a strong understanding of cybersecurity and mobility, giving you the expertise to effectively protect networks from unauthorized access, attacks, and other threats.
Computer Forensics Examiner
Computer Forensics Examiners recover and analyze digital evidence. These professionals work with law enforcement and government agencies to investigate cybercrime. Take this course to explore cybersecurity and its relevance in today’s connected world. You’ll learn about advanced targeted attacks and how to secure networks through a holistic approach.
Penetration Tester
Penetration Testers identify vulnerabilities in computer systems and networks by simulating attacks. This course can provide you with a solid foundation in cybersecurity and mobility, giving you the skills to effectively identify and exploit vulnerabilities in order to improve an organization’s security posture.
Malware Analyst
Malware Analysts investigate and analyze malware to understand its behavior and develop countermeasures. This course can provide you with a solid foundation in cybersecurity and mobility, giving you the skills to effectively identify, analyze, and mitigate malware threats.
Security Architect
Security Architects ensure the integrity of data and systems for an organization. This course can provide insight into cybersecurity and mobility by covering the evolution of threats, sophisticated tools used by perpetrators, and multidimensional and tiered cybersecurity strategies.
Chief Information Security Officer (CISO)
CISOs are responsible for developing and implementing an organization’s cybersecurity strategy. This course can provide you with a comprehensive understanding of cybersecurity and mobility, enabling you to effectively lead and manage an organization’s cybersecurity program.
Security Operations Center (SOC) Analyst
SOC Analysts monitor and analyze security events and incidents. This course can provide you with a solid foundation in cybersecurity and mobility, giving you the skills to effectively monitor, analyze, and respond to security events and incidents.
Information Technology (IT) Auditor
IT Auditors examine an organization’s IT infrastructure, policies, and operations to ensure compliance with regulations and best practices. By taking this course, you’ll gain valuable knowledge about cybersecurity and mobility, enabling you to effectively assess and mitigate risks within an organization’s IT systems.
Cybersecurity Manager
Cybersecurity Managers plan, implement, and oversee the security of computer systems and networks. This course aligns with your career goals by providing insights into cybersecurity, mobility, and their impact on organizational security. You’ll explore challenges, emerging trends, and effective strategies to safeguard data and systems.
IT Security Consultant
IT Security Consultants provide advice and guidance to organizations on how to improve their cybersecurity posture. This course can help you develop a solid foundation in cybersecurity and mobility, giving you the expertise to identify vulnerabilities, assess risks, and recommend appropriate security measures.
Security Incident Responder
Security Incident Responders investigate and respond to security incidents. This course can provide you with a solid foundation in cybersecurity and mobility, giving you the skills to effectively identify, contain, and mitigate security incidents.

Reading list

We've selected 14 books that we think will supplement your learning. Use these to develop background knowledge, enrich your coursework, and gain a deeper understanding of the topics covered in Cybersecurity and Mobility.
Comprehensive guide to the CEH exam. It covers all of the topics that are tested on the exam, and it valuable resource for students who are preparing for the exam.
Provides a comprehensive guide to mobile security and risk management. It covers topics such as mobile device security threats, security controls, and security best practices.
Provides a practical guide to network security assessment, enhancing the course's coverage of cybersecurity strategies and techniques.
Offers a comprehensive foundation in cryptography and network security, providing essential background knowledge for the course.
Offers insights into the psychological aspects of cybersecurity, complementing the course's focus on the human factor in cybersecurity.
Serves as a practical guide to network security vulnerabilities and countermeasures, enhancing the course's coverage of security assessment and mitigation.
Provides a comprehensive guide to cloud security. It covers topics such as cloud security threats, cloud security controls, and cloud security best practices.
Provides insights into the transformative impact of mobile technology on business and society, complementing the course's exploration of mobility trends.
Explores the characteristics and habits of mastery, offering insights into the pursuit of excellence in cybersecurity.
Provides a fictionalized account of DevOps and agile practices, offering valuable insights into the challenges and successes of IT and cybersecurity teams.
Introduces the principles of lean and agile methodologies, promoting a data-driven and iterative approach to cybersecurity.
Explores the principles of learning organizations, promoting continuous improvement and adaptation in cybersecurity.

Share

Help others find this course page by sharing it with your friends and followers:
Our mission

OpenCourser helps millions of learners each year. People visit us to learn workspace skills, ace their exams, and nurture their curiosity.

Our extensive catalog contains over 50,000 courses and twice as many books. Browse by search, by topic, or even by career interests. We'll match you to the right resources quickly.

Find this site helpful? Tell a friend about us.

Affiliate disclosure

We're supported by our community of learners. When you purchase or subscribe to courses and programs or purchase books, we may earn a commission from our partners.

Your purchases help us maintain our catalog and keep our servers humming without ads.

Thank you for supporting OpenCourser.

© 2016 - 2024 OpenCourser