About this Specialization

6,322 recent views
It seems anymore that you can't listen to the news without hearing of a data breach. You may have heard it said before that there are 2 types of companies out there, the ones who have been breached and those who will be breached. Defending against attackers who want to compromise assets can seem like an arduous task, but learning how attacks work and more importantly how to defend against those attacks can be very fulfilling. This specialization is designed to introduce you to practical computer security by teaching you the fundamentals of how you use security in the business world. This course is for those who want to understand how to defend computer systems and assets from attackers and other threats. It is also for those who want to understand how threats and attacks are carried out to help better defend their systems. This specialization is designed for senior business leaders to middle management and system administrators, so they can all speak the same language and get a better handle on their organization's security. Additionally, the course material may help you in passing some industry leading computer security examinations such as Security+ and CISSP.
Learner Career Outcomes
60%
Started a new career after completing this specialization.
40%
Got a pay increase or promotion.
Shareable Certificate
Earn a Certificate upon completion
100% online courses
Start instantly and learn at your own schedule.
Flexible Schedule
Set and maintain flexible deadlines.
Beginner Level
Approx. 5 months to complete
Suggested 2 hours/week
English
Learner Career Outcomes
60%
Started a new career after completing this specialization.
40%
Got a pay increase or promotion.
Shareable Certificate
Earn a Certificate upon completion
100% online courses
Start instantly and learn at your own schedule.
Flexible Schedule
Set and maintain flexible deadlines.
Beginner Level
Approx. 5 months to complete
Suggested 2 hours/week
English

There are 4 Courses in this Specialization

Course1

Course 1

Introduction to Cybersecurity for Business

4.7
stars
791 ratings
205 reviews
Course2

Course 2

Cyber Threats and Attack Vectors

4.7
stars
549 ratings
135 reviews
Course3

Course 3

Detecting and Mitigating Cyber Threats and Attacks

4.7
stars
347 ratings
75 reviews
Course4

Course 4

Proactive Computer Security

4.7
stars
200 ratings
50 reviews

Offered by

Placeholder

University of Colorado System

Frequently Asked Questions

More questions? Visit the Learner Help Center.