This course is designed to introduce students, working professionals and the community to the exciting field of cybersecurity. Throughout the MOOC, participants will engage in community discourse and online interaction. Participants will gain knowledge and understanding of cybersecurity and its domains. They will engage with expertly produced videos, gain insight from industry experts, participate in knowledge assessments, practice assessing their environmental awareness, and gain access to materials that address governance and risk management, compliance, business continuity and disaster recovery, cryptography, software development security, access control, network security, security architecture, security operations, and physical and environmental security. Learning will be assessed using strategies aligned to knowledge and understanding.
You do not need prior experience in IT security to do well in this course. All you need is a willingness to learn. We will point you to relevant open and free resources to assist you.
At the end of this course, you will have the option of applying for undergraduate level course credit at Kennesaw State University (dependent on admission to Kennesaw State University as a degree seeking or a non-degree seeking student). More information is available in final module "Receive Course (undergraduate) Credit at Kennesaw State University".
Checkout our marquee speaker. She's the Chief Privacy Officer at Coca Cola.
What's included
2 videos4 readings1 assignment
Show info about module content
2 videos•Total 4 minutes
Welcome to "Cybersecurity and Its Ten Domains"•2 minutes
The Importance of Cybersecurity•2 minutes
4 readings•Total 35 minutes
Welcome to the Course•10 minutes
Get help and meet other learners in this course. Join your discussion forums!•5 minutes
Meet the Instructor•10 minutes
Course Objectives•10 minutes
1 assignment•Total 30 minutes
Test Your Existing Knowledge•30 minutes
Introduction to Security, Access Control, and Software Development Security
Module 2•6 hours to complete
Module details
In this module we cover some of the fundamentals of security that will assist you throughout the course. We will then introduce you to two domains of cyber security: access control and software development security. Focus will be on areas such as confidentiality, integrity, and availability, as well secure software development techniques.
What's included
4 videos1 reading1 assignment1 peer review
Show info about module content
4 videos•Total 11 minutes
Module Overview•1 minute
Introduction to Security•3 minutes
Access Control•3 minutes
Software Development Security•4 minutes
1 reading•Total 190 minutes
Module Readings•190 minutes
1 assignment•Total 30 minutes
Introduction to Security, Access Control, and Software Development Security Quiz•30 minutes
1 peer review•Total 120 minutes
Discussion -- Role of Cyber Security•120 minutes
Business Continuity and Disaster Recovery Planning and Cryptography
Module 3•5 hours to complete
Module details
In this module we are going to delve a little deeper into cyber security by covering business continuity and disaster recovery planning and cryptography. Learners will be exposed to what a disruptive event is and how the federal government through agencies such as FEMA handles disasters. We will also covers encryption and decryption and the various techniques used.
What's included
3 videos1 reading1 assignment
Show info about module content
3 videos•Total 5 minutes
Module Overview•1 minute
Business Continuity and Disaster Recovery Planning•2 minutes
Cryptography•2 minutes
1 reading•Total 240 minutes
Module Readings•240 minutes
1 assignment•Total 30 minutes
Business Continuity and Disaster Recovery Planning and Cryptography Quiz•30 minutes
Information Security Governance and Risk Management & Legal, Regulations, Investigations, and Compliance
Module 4•4 hours to complete
Module details
In this module we are going to cover some of the non-technical topics associated to cyber security: Information security governance and risk management and legal, regulations, investigations, and compliance. It is important to realize, that non-technical does not mean easy, or not important. In fact, I would like to argue that they are more important that the technical side of cyber security.
What's included
3 videos1 reading1 assignment
Show info about module content
3 videos•Total 5 minutes
Module Overview•1 minute
Information Security Governance and Risk Management•2 minutes
Legal, Regulations, Investigations, and Compliance•2 minutes
1 reading•Total 190 minutes
Module Readings•190 minutes
1 assignment•Total 30 minutes
Information Security Governance and Risk Management & Legal, Regulations, Investigations, and Compliance Quiz•30 minutes
Operations Security & Physical and Environmental Security
Module 5•4 hours to complete
Module details
In this module we are going to cover what amount to some of the more intuitive parts of cybersecurity: operations security and physical and environmental security. Learners will understand operations security from a competitor/enemy/hacker’s viewpoint and then develop and apply countermeasures accordingly. Learners will also be exposed to electric power issues such as brownouts, fire detection and suppression, and HVAC.
What's included
3 videos1 reading1 assignment
Show info about module content
3 videos•Total 6 minutes
Module Overview•1 minute
Operations Security•4 minutes
Physical and Environmental Security•1 minute
1 reading•Total 190 minutes
Module Readings•190 minutes
1 assignment•Total 30 minutes
Operations Security & Physical and Environmental Security Quiz•30 minutes
Security Architecture and Design & Telecommunications and Network Security
Module 6•5 hours to complete
Module details
In this module we are going to cover some of the most technical and comprehensive topics that cyber security has to offer as we look at Security Architecture and Design and Telecommunications and Network Security. Learners will be exposed to security models such as Bell LaPadula, Clark-Wilson, Mandatory Access Control (MAC), Discretionary Access Control (DAC), Role-Based Access Control (RBAC), and Access Matrix. We will also describe the Open Systems Interconnect (OSI) model and its seven layers.
What's included
3 videos2 readings2 assignments
Show info about module content
3 videos•Total 5 minutes
Module Overview•1 minute
Security Architecture and Design•2 minutes
Telecommunications and Network Security•2 minutes
2 readings•Total 207 minutes
Module Readings•190 minutes
TEDx Talk - Pablos Holman•17 minutes
2 assignments•Total 60 minutes
Security Architecture and Design & Telecommunications and Network Security Quiz•30 minutes
Course Certificate Final Exam•30 minutes
Receive Undergraduate Course Credit at Kennesaw State University
Module 7•20 minutes to complete
Module details
In this module we provide details about leveraging this MOOC for credit at the undergraduate level at Kennesaw State University. It is very important that learners follow directions carefully.
What's included
1 reading
Show info about module content
1 reading•Total 20 minutes
Receiving Credit Overview•20 minutes
Instructor
Instructor ratings
Instructor ratings
We asked all learners to give feedback on our instructors based on the quality of their teaching style.
Kennesaw State is a Carnegie-designated doctoral research institution (R2), placing it among an elite group of only 6 percent of U.S. colleges. A leader in innovative teaching and learning, KSU is making an impact across the region, the nation and around the world. As the third largest university in the state of Georgia, Kennesaw State has nearly 45,000 students enrolled in over 180 undergraduate, master’s, doctoral degree and certificate programs.
"To be able to take courses at my own pace and rhythm has been an amazing experience. I can learn whenever it fits my schedule and mood."
Jennifer J.
Learner since 2020
"I directly applied the concepts and skills I learned from my courses to an exciting new project at work."
Larry W.
Learner since 2021
"When I need courses on topics that my university doesn't offer, Coursera is one of the best places to go."
Chaitanya A.
"Learning isn't just about being better at your job: it's so much more than that. Coursera allows me to learn without limits."
Learner reviews
4.3
2,415 reviews
5 stars
63.13%
4 stars
21.20%
3 stars
7.74%
2 stars
3.39%
1 star
4.51%
Showing 3 of 2415
R
RS
5·
Reviewed on Apr 24, 2020
Course is though but very education and gain skilled course. I am thankful to do this apportunity to join Coursera free course.Thank You So Much Coursera
L
LA
4·
Reviewed on Dec 5, 2017
I simply loved it I learned so much and I was surprised to learn many things and their importance to Cyber Security . This course is perfect for beginners. Thank You coursera.
R
RG
5·
Reviewed on May 31, 2020
A nice and knowledge gaining course. It was fun and interesting to learn our domain interest courses at our own phase was so luxurious and interesting to learn.
When will I have access to the lectures and assignments?
To access the course materials, assignments and to earn a Certificate, you will need to purchase the Certificate experience when you enroll in a course. You can try a Free Trial instead, or apply for Financial Aid. The course may offer 'Full Course, No Certificate' instead. This option lets you see all course materials, submit required assessments, and get a final grade. This also means that you will not be able to purchase a Certificate experience.
What will I get if I purchase the Certificate?
When you purchase a Certificate you get access to all course materials, including graded assignments. Upon completing the course, your electronic Certificate will be added to your Accomplishments page - from there, you can print your Certificate or add it to your LinkedIn profile.
Is financial aid available?
Yes. In select learning programs, you can apply for financial aid or a scholarship if you can’t afford the enrollment fee. If fin aid or scholarship is available for your learning program selection, you’ll find a link to apply on the description page.