Cybersecurity: Developing a Program for Your Business Specialization
Master the Fundamentals of Cybersecurity. Learn to assess cyber threats and protect business information assets.
About this Specialization
No prior experience required.
No prior experience required.
Dr. Humayun Zafar, CEH, CISMProfessor of Information Security and Assurance
Herbert J. Mattord, Ph.D., CISM, CISSP, CDPProfessor of Information Security and Assurance
University System of Georgia
The University System of Georgia is composed of 28 higher education institutions including 4 research universities, 2 regional universities, 12 state universities, 13 state colleges and the Skidaway Institute of Oceanography. The Georgia Public Library System, encompassing 61 library systems throughout Georgia, is also part of the University System.
Frequently Asked Questions
What is the refund policy?
If you subscribed, you get a 7-day free trial during which you can cancel at no penalty. After that, we don’t give refunds, but you can cancel your subscription at any time. See our full refund policy.
Can I just enroll in a single course?
Yes! To get started, click the course card that interests you and enroll. You can enroll and complete the course to earn a shareable certificate, or you can audit it to view the course materials for free. When you subscribe to a course that is part of a Specialization, you’re automatically subscribed to the full Specialization. Visit your learner dashboard to track your progress.
Is financial aid available?
Yes, Coursera provides financial aid to learners who cannot afford the fee. Apply for it by clicking on the Financial Aid link beneath the "Enroll" button on the left. You'll be prompted to complete an application and will be notified if you are approved. You'll need to complete this step for each course in the Specialization, including the Capstone Project. Learn more.
Can I take the course for free?
When you enroll in the course, you get access to all of the courses in the Specialization, and you earn a certificate when you complete the work. If you only want to read and view the course content, you can audit the course for free. If you cannot afford the fee, you can apply for financial aid.
Is this course really 100% online? Do I need to attend any classes in person?
This course is completely online, so there’s no need to show up to a classroom in person. You can access your lectures, readings and assignments anytime and anywhere via the web or your mobile device.
How long does it take to complete the Specialization?
There are three courses and one capstone course. Each course will last approximately 4 to 5 weeks. The capstone is expected to take 5 to 6 weeks to complete.
What background knowledge is necessary?
This Specialization covers the fundamentals of cybersecurity in the organization at a beginners level. It is beginners level because no prior experience or courses in Information Systems, Information security and Assurance, Cybersecurity, or Information Technology are necessary. However, it is a college-level course in which learners are expected to critically analyze the subject matter and apply it to their workplace scenarios.
Do I need to take the courses in a specific order?
We highly recommend taking the courses in order as each course builds on elements learned in the previous course. However each course may also act as stand-alone and you are welcome to register for each individually if you have previous learning experience in that subject area.
Will I earn university credit for completing the Specialization?
Currently this course offers no college credit, but this is subject to change.
What will I be able to do upon completing the Specialization?
This specialization will help the learner understand the ever-changing field of cybersecurity and its impact on the business environment. Learners will begin this specialization by learning current trends in mobile technology and how organizational policy is critical to maintain information security. Next, learners will be introduced to devices that support computer-to-computer interaction and how these devices can become "soft entry" points for hackers. The third course illustrates the "X-Factor" or the human influence in technology. Finally, learners will consider best practices in order for organizations to secure their networks. In terms of careers, future managers and leaders will need to learn about cybersecurity and the risk environment that results. This specialization will better position learners to enter into jobs that require strategic thought, organizational planning, and risk impact analysis. Cybersecurity is often overlooked in these areas. The specialization will prepare you to address those future needs and support your organization in cybersecurity awareness and risk mitigation.
More questions? Visit the Learner Help Center.