When you enroll in this course, you'll also be enrolled in this Specialization.
Learn new concepts from industry experts
Gain a foundational understanding of a subject or tool
Develop job-relevant skills with hands-on projects
Earn a shareable career certificate
There are 4 modules in this course
What is the X-Factor? In Cybersecurity, the X-Factor related to unknown and unpredictable human behavior within and outside of your organization. “No one really knows why humans do what they do”, (David K. Reynolds), and because of this organizations can be unprepared for malicious, untrained, or even best intentioned behavior that can cause alarm and sometimes irreparable harm.
This course will introduce you to the types of training available to reduce the impact of the X-Factor, evaluate its effectiveness, explore the Security Education, Training and Awareness (SETA) program, and learn why it may fail. The course will conclude with information designed to assist you with some critical components for your business security program. Activities focused on hactivism, cyberinsurance, and ransomware will round out your knowledge base. Your team of instructors has prepared a series of readings, discussions, guest lectures, and quizzes to engage you in this exciting topic.
The X-factor within information security is human behavior within and outside your organization. Our introduction includes an overview of information security management and its goals as well as describing the problem created by non-malicious insider behavior. We include discussion about the purpose of training within organizational cybersecurity efforts and whether it is achieving its purpose.
MISQ Executive: Information Security Management Overview•45 minutes
Phishing Attacks Hurt Convenience Of Online Banking In The Workplace•10 minutes
3 things every CISO should know•10 minutes
Shadow IT: Mitigating Security Risks•10 minutes
Get help and meet other learners in this course. Join your discussion forums!•5 minutes
1 assignment•Total 10 minutes
Introduction to the X-Factor Quiz•10 minutes
1 peer review•Total 45 minutes
The role of security professionals•45 minutes
1 discussion prompt•Total 10 minutes
Your own compliance behavior•10 minutes
Security Education: Training & Awareness
Module 2•2 hours to complete
Module details
Within this topic we will discuss traditional training efforts. Security education, training and awareness (SETA) programs are designed to reduce the incidence of accidental security breaches. Through the readings you will learn about the design and delivery of these programs as well as various training techniques. This module concludes with a discussion about your experience and opinion about organizational security training.
Industry Q&A: Customers and Security Training•3 minutes
Pulling it together•5 minutes
4 readings•Total 61 minutes
Learning Objectives•1 minute
Security Education, Training and Awareness•20 minutes
Training•20 minutes
Making Security Awareness Work•20 minutes
2 assignments•Total 40 minutes
Security Education: Training and Awareness Quiz•10 minutes
SETA Practice Quiz•30 minutes
1 discussion prompt•Total 30 minutes
Recent training experience•30 minutes
Reasons Why Traditional Training Efforts Fail
Module 3•4 hours to complete
Module details
In this module you will understand why traditional training efforts through SETA programs may fail. You will learn about human behavior and how understanding it can help managers better leverage their security efforts. Finally, through the readings you will also see that this is a global issue. The readings present examples of existing awareness campaigns in U.K., in Australia, in Canada and Africa.
Employee Habits, Errors, and Security Breaches•4 minutes
Habituation: What is it?•6 minutes
Pulling it together•3 minutes
5 readings•Total 146 minutes
Learning Objectives•1 minute
Why Do Cybersecurity Awareness Campaigns Fail?•50 minutes
The Impact of Past Behavior•45 minutes
How Does Behavior Become Habitual?•20 minutes
Global Threat Report•30 minutes
2 assignments•Total 60 minutes
Test Your Knowledge!•30 minutes
Why Do Cybersecurity Awareness Campaigns Fail Quiz•30 minutes
1 peer review•Total 30 minutes
Habits and Training Programs•30 minutes
1 discussion prompt•Total 10 minutes
Automated Behavior•10 minutes
Threat Intelligence
Module 4•3 hours to complete
Module details
We will conclude by identifying some novel problems and practices that organizations are experiencing. You will learn about hactivism, cyberinsurance, and ransomware through popular press readings about recent security problems that landed companies on the front page.
Kennesaw State is a Carnegie-designated doctoral research institution (R2), placing it among an elite group of only 6 percent of U.S. colleges. A leader in innovative teaching and learning, KSU is making an impact across the region, the nation and around the world. As the third largest university in the state of Georgia, Kennesaw State has nearly 45,000 students enrolled in over 180 undergraduate, master’s, doctoral degree and certificate programs.
"To be able to take courses at my own pace and rhythm has been an amazing experience. I can learn whenever it fits my schedule and mood."
Jennifer J.
Learner since 2020
"I directly applied the concepts and skills I learned from my courses to an exciting new project at work."
Larry W.
Learner since 2021
"When I need courses on topics that my university doesn't offer, Coursera is one of the best places to go."
Chaitanya A.
"Learning isn't just about being better at your job: it's so much more than that. Coursera allows me to learn without limits."
Learner reviews
4.7
260 reviews
5 stars
76.15%
4 stars
18.07%
3 stars
3.07%
2 stars
0.38%
1 star
2.30%
Showing 3 of 260
D
DK
5·
Reviewed on Oct 19, 2020
It is a very enriched course with a lot of information on cyber security.
S
SB
5·
Reviewed on Apr 19, 2020
A great course with show case of many real time scenarios and good study materials.
Z
ZL
5·
Reviewed on Mar 18, 2017
There is a lot of practical and actionable information in this course related to cybersecurity. I would highly recommend anyone interested in their organization's cybersecurity take this course!
When will I have access to the lectures and assignments?
To access the course materials, assignments and to earn a Certificate, you will need to purchase the Certificate experience when you enroll in a course. You can try a Free Trial instead, or apply for Financial Aid. The course may offer 'Full Course, No Certificate' instead. This option lets you see all course materials, submit required assessments, and get a final grade. This also means that you will not be able to purchase a Certificate experience.
What will I get if I subscribe to this Specialization?
When you enroll in the course, you get access to all of the courses in the Specialization, and you earn a certificate when you complete the work. Your electronic Certificate will be added to your Accomplishments page - from there, you can print your Certificate or add it to your LinkedIn profile.
Is financial aid available?
Yes. In select learning programs, you can apply for financial aid or a scholarship if you can’t afford the enrollment fee. If fin aid or scholarship is available for your learning program selection, you’ll find a link to apply on the description page.