This course is for you if you are interested in transitioning toward a managerial role in cybersecurity and mobility. Through interviews with industry experts in this area, you will be able to analyze innovations powering the rapid spread of information technology and how they present new challenges for protecting data. For example, mobile devices increase convenience but often bypass traditional security measures. After this course, you will be able to describe how the nature of the threat evolves, as culprits employ a burgeoning set of sophisticated tools to take advantage of our growing reliance on networks for critical-data exchange.
About this Course
Learner Career Outcomes
Learner Career Outcomes
University System of Georgia
The University System of Georgia is composed of 28 higher education institutions including 4 research universities, 2 regional universities, 12 state universities, 13 state colleges and the Skidaway Institute of Oceanography. The Georgia Public Library System, encompassing 61 library systems throughout Georgia, is also part of the University System.
- 5 stars
- 4 stars
- 3 stars
- 2 stars
- 1 star
TOP REVIEWS FROM CYBERSECURITY AND MOBILITY
It was a wonderful course, it helped me a lot, thanks to the instructor and everyone who were related with this course and thanks to Coursera for giving us this wonderful opportunity. Thank you.
If anyone wants to know about Basics of Cybersecurity, Mobility and IoT, this is one of the very good course. I will recommend it to others. Thanks To CourseEra and the teachers.
This was a good simple overview, but I notice that many of the materials are over 5 years old - I would have expected that the technology and approached have evolved since then.
Good course for general knowledge of the subject. I felt the amount of reading, especially the 4th week, should be more accurately represented. At least for time management.
About the Cybersecurity: Developing a Program for Your Business Specialization
Cybersecurity is an essential business skill for the evolving workplace. For-profit companies, government agencies, and not-for-profit organizations all need technologically proficient, business-savvy information technology security professionals. In this Specialization, you will learn about a variety of processes for protecting business assets through policy, education and training, and technology best practices. You’ll develop an awareness of the risks and cyber threats or attacks associated with modern information usage, and explore key technical and managerial topics required for a balanced approach to information protection. Topics will include mobility, the Internet of Things, the human factor, governance and management practices.
Frequently Asked Questions
When will I have access to the lectures and assignments?
What will I get if I subscribe to this Specialization?
Is financial aid available?
More questions? Visit the Learner Help Center.