When you enroll in this course, you'll also be enrolled in this Specialization.
Learn new concepts from industry experts
Gain a foundational understanding of a subject or tool
Develop job-relevant skills with hands-on projects
Earn a shareable career certificate
There are 6 modules in this course
Cybersecurity affects everyone, including in the delivery of basic products and services. If you or your organization want to better understand how to address your cybersecurity, this is the course for you and your colleagues to take -- from seasoned professionals to your non-technical colleagues.
Your instructor, Dr. Charles Harry, has served on the front lines with the NSA (National Security Agency) and as an expert advising corporate and institutional leaders on managing cybersecurity risk. And he brings a rare and engaging perspective to help you learn cybersecurity from the ground up.
Cybersecurity for Everyone lays the groundwork to understand and explore the key issues facing policy makers attempting to manage the problem of cybersecurity, from its technical foundations to the domestic and international policy considerations surrounding governance, privacy, and risk management, to applications for achieving the goals of an enterprise, an institution, or a nation. This course is designed for students with some or no background in information technology, whether a novice or active in the cybersecurity field (engineers and computer scientists will learn the broader context and business aspects of cybersecurity), and will provide the principles to understand the current debates shaping a rapidly evolving security landscape.
What's included
8 videos4 readings1 assignment
Show info about module content
8 videos•Total 61 minutes
Foundations: An Introduction•1 minute
What is Cyber?•9 minutes
What is Security? •8 minutes
Demystifying the Cybersecurity Problem•9 minutes
The Threat Landscape•16 minutes
Threat Landscape Challenge•6 minutes
Examples of Cyber Incidence•7 minutes
Practical Questions•6 minutes
4 readings•Total 115 minutes
Optional Reading: Harry, C & Gallagher, N “ Classifying Cyber Events: A Proposed Taxonomy”•40 minutes
National Research Council, “At the Nexus of Cybersecurity and Public Policy”, Ch. 1 •30 minutes
For context: Avast, 2020 Threat Landscape Report •30 minutes
For context: James R. Clapper, Worldwide Threat Assessment of the US Intelligence Community (Feb. 2015) – pp. 1-4•15 minutes
1 assignment•Total 10 minutes
Week 1 Quiz•10 minutes
Cybersecurity for Everyone: Evolution of the Internet (Week 2)
Module 2•2 hours to complete
Module details
What's included
6 videos1 reading1 assignment
Show info about module content
6 videos•Total 54 minutes
Academic Inspiration and a World Changing Idea•10 minutes
Government Support and Prototyping•10 minutes
Private Sector Support and Moving the Internet Out of the Lab•10 minutes
Privatizing and Scaling the Internet•8 minutes
Building the World Wide Web•7 minutes
The Internet as a Global Commons•9 minutes
1 reading•Total 45 minutes
Leiner, Cerf, et. al., A Brief History of the Internet – pp. 1-9•45 minutes
1 assignment•Total 15 minutes
Week 2 Quiz•15 minutes
Cybersecurity for Everyone: Global Telecommunications Architecture and Governance (Week 3)
Module 3•3 hours to complete
Module details
What's included
6 videos4 readings1 assignment
Show info about module content
6 videos•Total 62 minutes
How Data Moves: Encapsulation•9 minutes
How Data Moves: Application Layer•10 minutes
How Data Moves: Network Layer•8 minutes
How Data Moves: Physical Layer•15 minutes
What is Governance?•6 minutes
Governing the Internet•15 minutes
4 readings•Total 130 minutes
Vangie Beal “The 7 layers of the OSI Model”, Webopedia •20 minutes
For context: Joseph S. Nye, Jr. “The Regime Complex for Managing Global Cyber Activities”, Global Commission on Internet Governance“ 2014•30 minutes
For Context: Assante & Bochman “IoT, Automation, Autonomy, and Megacities in 2025: A Dark Preview”, Center for Strategic & International Studies, April 2017•40 minutes
Fischer, “The Internet of Things: Frequently Asked Questions” Congressional Research Service, Oct 2015 •40 minutes
1 assignment•Total 15 minutes
Week 3 Quiz•15 minutes
Cybersecurity for Everyone: Threat Actors and Their Motivations (Week 4)
Module 4•4 hours to complete
Module details
What's included
6 videos3 readings1 assignment
Show info about module content
6 videos•Total 52 minutes
Threat Actors: Who Are the Hackers?•9 minutes
Threat Actors: Hobbyists•9 minutes
Threat Actors: Criminal Organizations•9 minutes
Cyber Crime Case Study: The San Francisco Muni Attack •7 minutes
For context: Cybersecurity Threats Impacting the Nation•30 minutes
Fire Eye, “APT28 Cybergroup Activity” •30 minutes
Lillian Ablon, Martin C. Libicki, Andrea A. Golay, Markets for cybercrime tools and stolen data, RAND Corporation •120 minutes
1 assignment•Total 10 minutes
Week 4 Quiz•10 minutes
Cybersecurity for Everyone: The Hacking Process (Week 5)
Module 5•4 hours to complete
Module details
What's included
7 videos3 readings1 assignment
Show info about module content
7 videos•Total 47 minutes
Hacking As a Process•9 minutes
Reconnaissance•8 minutes
Weaponization•4 minutes
Delivery•5 minutes
Exploitation and Installation•6 minutes
Command and Control•9 minutes
Effects•7 minutes
3 readings•Total 155 minutes
Lockheed Martin Cyber Kill chain •20 minutes
MITRE ATT&CK Framework•90 minutes
Boebert, W. Earl, “A Survey of Challenges in Attribution,” in National Research Council, Proceedings of a Workshop on Deterring Cyberattacks, 2010, pp. 41-52.•45 minutes
1 assignment•Total 10 minutes
Week 5 Quiz•10 minutes
Cybersecurity for Everyone: End Effects - Direct and Indirect Consequences (Week 6)
Module 6•6 hours to complete
Module details
What's included
5 videos1 reading1 assignment1 peer review
Show info about module content
5 videos•Total 43 minutes
Framing Effects•6 minutes
Primary Effects•14 minutes
Secondary Effects•11 minutes
Second Level Effects•8 minutes
A Strategic Approach to Cybersecurity•4 minutes
1 reading•Total 40 minutes
Harry, C & Gallagher, N “ Classifying Cyber Events: A Proposed Taxonomy” , CISSM•40 minutes
1 assignment•Total 15 minutes
Week 6 Quiz•15 minutes
1 peer review•Total 240 minutes
Course Final Project•240 minutes
Earn a career certificate
Add this credential to your LinkedIn profile, resume, or CV. Share it on social media and in your performance review.
Instructor
Instructor ratings
Instructor ratings
We asked all learners to give feedback on our instructors based on the quality of their teaching style.
The University of Maryland, College Park is the state's flagship university and one of the nation's preeminent public research universities. A global leader in research, entrepreneurship and innovation, the university is home to more than 40,700 students, 14,000 faculty and staff, and nearly 400,000 alumni. The university’s faculty includes two Nobel laureates, 10 Pulitzer Prize winners, 69 members of the national academies and scores of Fulbright scholars. Located just outside Washington, D.C., the University of Maryland is committed to social entrepreneurship as the nation’s first “Do Good” campus, and discovers and shares new knowledge every day through research and programs in academics, the arts, and athletics.
"To be able to take courses at my own pace and rhythm has been an amazing experience. I can learn whenever it fits my schedule and mood."
Jennifer J.
Learner since 2020
"I directly applied the concepts and skills I learned from my courses to an exciting new project at work."
Larry W.
Learner since 2021
"When I need courses on topics that my university doesn't offer, Coursera is one of the best places to go."
Chaitanya A.
"Learning isn't just about being better at your job: it's so much more than that. Coursera allows me to learn without limits."
Learner reviews
4.7
3,293 reviews
5 stars
80.21%
4 stars
15.02%
3 stars
2.57%
2 stars
0.57%
1 star
1.60%
Showing 3 of 3293
B
BG
5·
Reviewed on Jun 24, 2023
"Should everyone need to learn this courseShould Everyone need tneedneedEveryonneI think everyone needs to learn this courI Thinkthink everyone needs to learn this courscoursecourse
A
AI
5·
Reviewed on Jul 9, 2022
This course is a very nice one. The lecturer was good and the project was a nice way to help students understand the nitigrity of cybersecurity. In all the course is an excellent one.
O
OA
5·
Reviewed on Jan 2, 2023
Cybersecurity for Everyone is a valuable resource for anyone looking to improve their understanding of cybersecurity and protect themselves and their organizations from online threats.
When will I have access to the lectures and assignments?
To access the course materials, assignments and to earn a Certificate, you will need to purchase the Certificate experience when you enroll in a course. You can try a Free Trial instead, or apply for Financial Aid. The course may offer 'Full Course, No Certificate' instead. This option lets you see all course materials, submit required assessments, and get a final grade. This also means that you will not be able to purchase a Certificate experience.
What will I get if I subscribe to this Specialization?
When you enroll in the course, you get access to all of the courses in the Specialization, and you earn a certificate when you complete the work. Your electronic Certificate will be added to your Accomplishments page - from there, you can print your Certificate or add it to your LinkedIn profile.
Is financial aid available?
Yes. In select learning programs, you can apply for financial aid or a scholarship if you can’t afford the enrollment fee. If fin aid or scholarship is available for your learning program selection, you’ll find a link to apply on the description page.