We may earn an affiliate commission when you visit our partners.
Course image
Richard White

Welcome to Course 1 in CS4950, Homeland Security and Cybersecruity. In this course we examine the origins of homeland security and its connection with cybersecurity. Homeland security is about safeguarding the United States from domestic catastrophic destruction. Catastrophic destruction comes in two forms: natural and man-made. For most of history the man-made variety came in the form of warfare and required the combined resources of a nation state. All that changed March 20th, 1995. On that date, members of a quasi-religious cult in Japan attacked the Tokyo subway system using Sarin gas. It was the first deployment of a weapon of mass destruction my a non-state actor. The power of destruction once reserved to nation states was now available to small groups, even individuals. The incident was a wake up call for governments around the world. Defense establishments designed to keep rogue states in check were practically useless against non-state actors. Overnight, the number of potential enemies multiplied a hundred, maybe even a thousand-fold. In response to the Tokyo Subway Attacks, the United States took measures to protect itself from WMD attack by non-state actors. Those measures were still being enacted when the nation was attacked on 9/11. On September 11, 2001, nineteen hijackers inflicted as much damage as the Imperial Japanese Navy on December 7, 1941. The investigating 9/11 Commission noted the attacks for their "surpassing disproportion". The hijackers had achieved WMD effects without using WMD. They did this by subverting the nation's transportation infrastructure, turning passenger jets into guided missiles. Again, the security implications were profound. Non-state actors seeking to inflict domestic catastrophic destruction did not need to import, fabricate, or acquire WMD as the nation was surrounded by the means of its own destruction in the form of critical infrastructure. The vulnerability of critical infrastructure had not gone unnoticed. Again, in response to the Tokyo Subway attacks, which themselves had been an attack on Japanese infrastructure, President Clinton in 1996 commissioned a panel to investigate the threat to United States' infrastructure. The panel replied in 1997 that there was no immediate threat to US infrastructure, but they were concerned with the growing risk of cyber attack. The same cyber physical systems that fueled the explosive growth of the Internet were being incorporated into Industrial Control Systems that underpinned much of the nation's critical infrastructure. The panel noted that the knowledge and skills necessary to mount a cyber attack on the nation's infrastructure was growing. As a result of this observation, President Clinton in 1998 ordered the protection of US critical infrastructure, especially from cyber attack. Following 9/11, critical infrastructure protection and cybersecurity were designated core missions in the 2002 Homeland Security Act establishing the new Department of Homeland Security. They remain core missions to this day, but many don't see the connection. The connection is this: cybersecurity is essential to critical infrastructure protection, which is essential to homeland security, which is about safeguarding the United States from domestic catastrophic destruction. I look forward to working with you in the coming lessons. Best wishes and good luck!

Read more

Welcome to Course 1 in CS4950, Homeland Security and Cybersecruity. In this course we examine the origins of homeland security and its connection with cybersecurity. Homeland security is about safeguarding the United States from domestic catastrophic destruction. Catastrophic destruction comes in two forms: natural and man-made. For most of history the man-made variety came in the form of warfare and required the combined resources of a nation state. All that changed March 20th, 1995. On that date, members of a quasi-religious cult in Japan attacked the Tokyo subway system using Sarin gas. It was the first deployment of a weapon of mass destruction my a non-state actor. The power of destruction once reserved to nation states was now available to small groups, even individuals. The incident was a wake up call for governments around the world. Defense establishments designed to keep rogue states in check were practically useless against non-state actors. Overnight, the number of potential enemies multiplied a hundred, maybe even a thousand-fold. In response to the Tokyo Subway Attacks, the United States took measures to protect itself from WMD attack by non-state actors. Those measures were still being enacted when the nation was attacked on 9/11. On September 11, 2001, nineteen hijackers inflicted as much damage as the Imperial Japanese Navy on December 7, 1941. The investigating 9/11 Commission noted the attacks for their "surpassing disproportion". The hijackers had achieved WMD effects without using WMD. They did this by subverting the nation's transportation infrastructure, turning passenger jets into guided missiles. Again, the security implications were profound. Non-state actors seeking to inflict domestic catastrophic destruction did not need to import, fabricate, or acquire WMD as the nation was surrounded by the means of its own destruction in the form of critical infrastructure. The vulnerability of critical infrastructure had not gone unnoticed. Again, in response to the Tokyo Subway attacks, which themselves had been an attack on Japanese infrastructure, President Clinton in 1996 commissioned a panel to investigate the threat to United States' infrastructure. The panel replied in 1997 that there was no immediate threat to US infrastructure, but they were concerned with the growing risk of cyber attack. The same cyber physical systems that fueled the explosive growth of the Internet were being incorporated into Industrial Control Systems that underpinned much of the nation's critical infrastructure. The panel noted that the knowledge and skills necessary to mount a cyber attack on the nation's infrastructure was growing. As a result of this observation, President Clinton in 1998 ordered the protection of US critical infrastructure, especially from cyber attack. Following 9/11, critical infrastructure protection and cybersecurity were designated core missions in the 2002 Homeland Security Act establishing the new Department of Homeland Security. They remain core missions to this day, but many don't see the connection. The connection is this: cybersecurity is essential to critical infrastructure protection, which is essential to homeland security, which is about safeguarding the United States from domestic catastrophic destruction. I look forward to working with you in the coming lessons. Best wishes and good luck!

Course 1: Homeland Security & Cybersecurity Connection

Course 2: Cybersecurity Policy for Water and Electricity Infrastructures

Course 3: Cybersecurity Policy for Aviation and Internet Infrastructures

Course 4: Homeland Security & Cybersecurity Future

Enroll now

Two deals to help you save

We found two deals and offers that may be relevant to this course.
Save money when you learn. All coupon codes, vouchers, and discounts are applied automatically unless otherwise noted.

What's inside

Syllabus

Module 1: Domestic Catastrophic Destruction
Homeland security is about safeguarding the United States from domestic catastrophic destruction. Domestic catastrophic destruction comes in two forms: natural and manmade. For most of history, the manmade variety came in the form of warfare and required the combined resources of a nation state. In this module we examine two pivotal incidents that changed that calculus, and demonstrated how destruction once reserved to the power of nation states was wrested by non-state actors.
Read more
Module 2: HS & DHS
This module tackles the question "what is homeland security", and offers a working definition to help guide the student to understanding. It also looks at the mission of the Department of Homeland Security as it relates to "Safeguarding the United States from Domestic Catastrophic Destruction". Also included in this module is course exam #1. Good luck!
Module 3: Safeguarding Against Domestic Catastrophic Destruction
Manmade domestic catastrophic destruction comes in two known forms: 1) weapons of mass destruction, and 2) subverting critical infrastructure. This module looks at the nation's overall strategy for countering WMD, and protecting critical infrastructure.
Module 4: Homeland Security and Cybersecurity
As stated previously, homeland security is connected to cybersecurity through critical infrastructure protection. How this insight came about and what is meant by "cybersecurity" are the focus of attention in this module. Also included in this module is course exam #2 and related project assignment. Good luck!

Good to know

Know what's good
, what to watch for
, and possible dealbreakers
Introduces students to the evolving landscape of homeland security
Provides a working definition of homeland security
Connects homeland security with cybersecurity through critical infrastructure protection
Examines the history of homeland security, including pivotal incidents that changed its definition
Covers legal and policy aspects of homeland security
Led by an experienced instructor in the field of homeland security

Save this course

Save Homeland Security & Cybersecurity Connection - It's Not About the Terrorists to your list so you can find it easily later:
Save

Reviews summary

Homeland security and cybersecurity connection

Learners say this Homeland Security course has engaging assignments, knowledgeable instructors, and well-presented materials. They say this course is informative and helpful for understanding Homeland Security's role in cybersecurity, especially for those new to the field. Reviews indicate that this excellent course is well-received, but it is admittedly slightly difficult.
The course instructor is knowledgeable, friendly, and enthusiastic.
"Good subject.I had never seen such good communicating instructor."
"Information provided is very informative and the Instructor, Dr. White is very knowledgeable and friendly. "
"The Course Coordinator is very good, well read and vast. He knows his onions well."
Learners appreciate the course's focus on practical applications and real-world examples, which enhance their understanding of the topic.
"Loved this course, it was very enlightening for me, and used some really great examples from the intelligence world."
"It was very helpful when Professor White goes back through all the main points of lecture after the end of each lesson. "
"This course is very detailed and easy to understand."
Materials provided are clear, engaging, and well-written.
"Very clear and well written. "
"Excellent material in plain language. Easy to follow and comprehend."
"Study materials are very focused an in line with the objectives."
The course provides a comprehensive overview of Homeland Security and cybersecurity, covering key concepts and historical aspects.
"Interesting and relevant content"
"Very informative and challenging course."
"This course gives broad overview of concept of Homeland Security and DHS-its purpose, and duties. "
While the course is generally well-received, some learners note that it can be challenging, especially for those new to the subject matter.
"Although this course is hard enough but the materials provided by instructor was very effective."
"Not what I was looking for . . ."
"For readings, I would recommend specifying which pages to read to avoid confusion."

Activities

Be better prepared before your course. Deepen your understanding during and after it. Supplement your coursework and achieve mastery of the topics covered in Homeland Security & Cybersecurity Connection - It's Not About the Terrorists with these activities:
Review catastrophic destruction
Reviewing the different types of catastrophic destruction will help you better understand the course content on homeland security and cybersecurity.
Show steps
  • Read the course description and syllabus.
  • Make a list of the different types of catastrophic destruction.
  • Research each type of catastrophic destruction.
Discuss the Tokyo Subway Attack
Discussing the Tokyo Subway Attack will help you understand the origins of homeland security and its connection with cybersecurity.
Show steps
  • Find a peer study group.
  • Discuss the Tokyo Subway Attack.
Practice cybersecurity drills
Practicing cybersecurity drills will help you understand the importance of protecting critical infrastructure.
Show steps
  • Find a cybersecurity drill to practice.
  • Practice the cybersecurity drill.
  • Review the results of the cybersecurity drill.
Four other activities
Expand to see all activities and additional details
Show all seven activities
Create a presentation on 9/11
Creating a presentation on 9/11 will help you understand the impact of non-state actor attacks on homeland security and cybersecurity.
Show steps
  • Gather information about the 9/11 attacks.
  • Create a presentation outline.
  • Develop the presentation content.
  • Practice delivering the presentation.
Develop a cybersecurity plan for your home
Developing a cybersecurity plan for your home will help you understand the importance of protecting yourself from cyber attacks.
Browse courses on Cybersecurity
Show steps
  • Identify the threats to your home.
  • Develop a plan to protect your home from cyber attacks.
  • Implement your cybersecurity plan.
  • Test your cybersecurity plan.
Contribute to an open-source cybersecurity project
Contributing to an open-source cybersecurity project will help you develop your cybersecurity skills and knowledge.
Browse courses on Cybersecurity
Show steps
  • Find an open-source cybersecurity project to contribute to.
  • Learn about the project.
  • Make a contribution to the project.
  • Submit your contribution to the project.
Create a study guide for the course
Creating a study guide for the course will help you organize and review the course material.
Show steps
  • Gather all of the course materials.
  • Identify the key concepts in each module.
  • Create a study guide that outlines the key concepts.
  • Review the study guide regularly.

Career center

Learners who complete Homeland Security & Cybersecurity Connection - It's Not About the Terrorists will develop knowledge and skills that may be useful to these careers:
Information Security Analyst
An Information Security Analyst is a professional who works to protect an organization's information systems and data from unauthorized access, use, disclosure, disruption, modification, or destruction. This course may be useful in this type of role because it provides a broad overview of homeland security and cybersecurity, including the threats to critical infrastructure and the measures that can be taken to protect it.
Security Engineer
A Security Engineer is a professional who designs, implements, and maintains security systems for organizations. This course may be useful in this type of role because it provides a broad overview of homeland security and cybersecurity, including the threats to critical infrastructure and the measures that can be taken to protect it.
Cybersecurity Analyst
A Cybersecurity Analyst is a professional who works to prevent or respond to cyberattacks. This course may be useful in this type of role because it provides a broad overview of homeland security and cybersecurity, including the threats to critical infrastructure and the measures that can be taken to protect it.
Security Consultant
A Security Consultant is a professional who provides advice and guidance to organizations on how to improve their security posture. This course may be useful in this type of role because it provides a broad overview of homeland security and cybersecurity, including the threats to critical infrastructure and the measures that can be taken to protect it.
Cybersecurity Specialist
A Cybersecurity Specialist is a professional who provides specialized expertise in cybersecurity to organizations. This course may be useful in this type of role because it provides a broad overview of homeland security and cybersecurity, including the threats to critical infrastructure and the measures that can be taken to protect it.
Cybersecurity Manager
A Cybersecurity Manager is a professional who is responsible for the overall cybersecurity program of an organization. This course may be useful in this type of role because it provides a broad overview of homeland security and cybersecurity, including the threats to critical infrastructure and the measures that can be taken to protect it.
IT Security Manager
An IT Security Manager is a professional who is responsible for the security of an organization's information technology systems and data. This course may be useful in this type of role because it provides a broad overview of homeland security and cybersecurity, including the threats to critical infrastructure and the measures that can be taken to protect it.
Cybersecurity Architect
A Cybersecurity Architect is a professional who designs and implements cybersecurity solutions for organizations. This course may be useful in this type of role because it provides a broad overview of homeland security and cybersecurity, including the threats to critical infrastructure and the measures that can be taken to protect it.
Cybersecurity Incident Responder
A Cybersecurity Incident Responder is a professional who responds to and investigates cybersecurity incidents. This course may be useful in this type of role because it provides a broad overview of homeland security and cybersecurity, including the threats to critical infrastructure and the measures that can be taken to protect it.
Critical Infrastructure Protection Analyst
A Critical Infrastructure Protection Analyst is a professional who works to protect the nation's critical infrastructure from threats and vulnerabilities. This course may be useful in this type of role because it provides a broad overview of homeland security and cybersecurity, including the threats to critical infrastructure and the measures that can be taken to protect it.

Reading list

We've selected 12 books that we think will supplement your learning. Use these to develop background knowledge, enrich your coursework, and gain a deeper understanding of the topics covered in Homeland Security & Cybersecurity Connection - It's Not About the Terrorists.
Provides a comprehensive overview of homeland security, covering the history, evolution, and current state of the field. It examines the various threats to homeland security, including terrorism, natural disasters, and cyberattacks, and discusses the measures that can be taken to protect against these threats.
Provides a comprehensive overview of cybersecurity, with a focus on protecting critical infrastructure. It covers the various types of cyber threats, including malware, hacking, and phishing, and discusses the measures that can be taken to protect against these threats.
Provides a comprehensive overview of terrorism and counterterrorism, covering the history, evolution, and current state of the field. It examines the various types of terrorist groups, their motivations, and their methods of operation, and discusses the measures that can be taken to counterterrorism.
Examines the future of homeland security, discussing the challenges and opportunities that lie ahead. It explores the emerging threats to homeland security, such as climate change, pandemics, and terrorism, and discusses the measures that can be taken to address these threats.
Provides a comprehensive reference guide to homeland security, covering the history, evolution, and current state of the field. It includes a variety of articles on different aspects of homeland security, including terrorism, natural disasters, and cyberattacks.
Provides a comprehensive overview of cybersecurity, covering the history, evolution, and current state of the field. It includes a variety of articles on different aspects of cybersecurity, including malware, hacking, and phishing.
Collection of essays on terrorism, covering a variety of topics, including the history, evolution, and current state of the field. It includes essays from a variety of experts on terrorism, and provides a comprehensive overview of the field.
Provides a practical guide to cybersecurity, covering the various types of cyber threats, and the measures that can be taken to protect against these threats.
Provides a comprehensive overview of homeland security, covering the history, evolution, and current state of the field. It includes a variety of articles on different aspects of homeland security, including terrorism, natural disasters, and cyberattacks.
Provides a practical guide to cybersecurity, covering the various types of cyber threats, and the measures that can be taken to protect against these threats.
Provides a concise history of homeland security, covering the major events and developments that have shaped the field.

Share

Help others find this course page by sharing it with your friends and followers:

Similar courses

Here are nine courses similar to Homeland Security & Cybersecurity Connection - It's Not About the Terrorists.
Homeland Security and Cybersecurity Future
Most relevant
Cybersecurity Policy for Aviation and Internet...
Most relevant
Cybersecurity Policy for Water and Electricity...
Most relevant
Cybersecurity Capstone: Breach Response Case Studies
Most relevant
Cybersecurity Foundations Fluency
Most relevant
Cybersecurity Foundations
Most relevant
Prepper's Guide To Food Storage
Cybersecurity Basics
Beginners Guide to Cybersecurity
Our mission

OpenCourser helps millions of learners each year. People visit us to learn workspace skills, ace their exams, and nurture their curiosity.

Our extensive catalog contains over 50,000 courses and twice as many books. Browse by search, by topic, or even by career interests. We'll match you to the right resources quickly.

Find this site helpful? Tell a friend about us.

Affiliate disclosure

We're supported by our community of learners. When you purchase or subscribe to courses and programs or purchase books, we may earn a commission from our partners.

Your purchases help us maintain our catalog and keep our servers humming without ads.

Thank you for supporting OpenCourser.

© 2016 - 2024 OpenCourser