What is the X-Factor? In Cybersecurity, the X-Factor related to unknown and unpredictable human behavior within and outside of your organization. “No one really knows why humans do what they do”, (David K. Reynolds), and because of this organizations can be unprepared for malicious, untrained, or even best intentioned behavior that can cause alarm and sometimes irreparable harm.
This course is part of the Cybersecurity: Developing a Program for Your Business Specialization
About this Course
Dr. Humayun Zafar, CEH, CISM, CRISC, PCIPProfessor of Information Security and Assurance
Herbert J. Mattord, Ph.D., CISM, CISSP, CDPProfessor of Information Security
Andy Green, Ph.D.Assistant Professor of Information Security and Assurance
University System of Georgia
The University System of Georgia is composed of 28 higher education institutions including 4 research universities, 2 regional universities, 12 state universities, 13 state colleges and the Skidaway Institute of Oceanography. The Georgia Public Library System, encompassing 61 library systems throughout Georgia, is also part of the University System.
- 5 stars76%
- 4 stars18%
- 3 stars3.20%
- 2 stars0.40%
- 1 star2.40%
TOP REVIEWS FROM CYBERSECURITY AND THE X-FACTOR
A great course with show case of many real time scenarios and good study materials.
was really interesting to grab the knowledge in this platform Good to go.......
Great course, understanding that our biggest security threat is our own behaviour is key to building cybersecurity.
Great course with good reading material and lectures.
About the Cybersecurity: Developing a Program for Your Business Specialization
Cybersecurity is an essential business skill for the evolving workplace. For-profit companies, government agencies, and not-for-profit organizations all need technologically proficient, business-savvy information technology security professionals. In this Specialization, you will learn about a variety of processes for protecting business assets through policy, education and training, and technology best practices. You’ll develop an awareness of the risks and cyber threats or attacks associated with modern information usage, and explore key technical and managerial topics required for a balanced approach to information protection. Topics will include mobility, the Internet of Things, the human factor, governance and management practices.
Frequently Asked Questions
When will I have access to the lectures and assignments?
What will I get if I subscribe to this Specialization?
Is financial aid available?
More questions? Visit the Learner Help Center.