In order to manage the cybersecurity function business, you must first understand its language and its environment. This course covers the foundations of cybersecurity, including threats and vulnerabilities as well as the tools, technologies, and strategies used to manage it.
This course is part of the Managing Cybersecurity Specialization
About this Course
What you will learn
Define key concepts and terminology in Cybersecurity
Describe key threats to cybersecurity
Define strategies to identify and remediate vulnerabilities in information assets
Give examples of the systemic components (including personnel) necessary for an effective cybersecurity program
Skills you will gain
- Security vulnerabilities and treatments
- Threats to cybersecurity
- Cybersecurity terminology
- cybersecurity program elements
Syllabus - What you will learn from this course
Welcome to The Foundations of Cybersecurity (Course 1)
Introduction to Cybersecurity (Module 1.1)
Threats to Cybersecurity (Module 1.2)
Security Technologies (Module 1.3)
- 5 stars80.67%
- 4 stars16.51%
- 3 stars2.25%
- 1 star0.56%
TOP REVIEWS FROM THE FOUNDATIONS OF CYBERSECURITY
I had a great experience studying Cybersecurity with Coursera. It's a really nie course and it cover the majority topics about cyber. Thank you!
Great intro to what cyber security is. The talking was quite robotic but its was presented in an understandable way. This course is a great starting point.
The course covers the basic and the important points both . Easy to understand and good for beginners.
This is a great basic course for those without a lot of technical knowledge. It gives a good overview of cybersecurity practices in a large or medium-size organization.
About the Managing Cybersecurity Specialization
Frequently Asked Questions
When will I have access to the lectures and assignments?
What will I get if I subscribe to this Specialization?
Is financial aid available?
More questions? Visit the Learner Help Center.