Cybersecurity for Everyone Free Download

GET Cybersecurity for Everyone Free Download

Cybersecurity affects everyone, including in the delivery of basic products and services. If you or your organization want to better understand how to address your cybersecurity, this is the course for you and your colleagues to take — from seasoned professionals to your non-technical colleagues.

Your instructor, Dr. Charles Harry, has served on the front lines with the NSA (National Security Agency) and as an expert advising corporate and institutional leaders on managing cybersecurity risk. And he brings a rare and engaging perspective to help you learn cybersecurity from the ground up. Cybersecurity for Everyone lays the groundwork to understand and explore the key issues facing policy makers attempting to manage the problem of cybersecurity, from its technical foundations to the domestic and international policy considerations surrounding governance, privacy, and risk management, to applications for achieving the goals of an enterprise, an institution, or a nation. This course is designed for students with some or no background in information technology, whether a novice or active in the cybersecurity field (engineers and computer scientists will learn the broader context and business aspects of cybersecurity), and will provide the principles to understand the current debates shaping a rapidly evolving security landscape.

SKILLS YOU WILL GAIN

  • Defining Cyber
  • Security
  • Cybersecurity Policy

What you will learn from this course

Week 1: Defining Cyber, Security, and Cybersecurity Policy

  • Foundations: An Introduction
  • What is Cyber?
  • What is Security?
  • Demystifying the Cybersecurity Problem
  • The Threat Landscape
  • Threat Landscape Challenge
  • Examples of Cyber Incidence
  • Practical Questions
  • Optional Reading: Harry, C & Gallagher, N “ Classifying Cyber Events: A Proposed Taxonomy”
  • National Research Council, “At the Nexus of Cybersecurity and Public Policy”, Ch. 1 
  • Avast, 2020 Threat Landscape Report 
  • James R. Clapper, Worldwide Threat Assessment of the US Intelligence Community (Feb. 2015) – pp. 1-4
  • Week 1 Quiz

Week 2: Evolution of the Internet

  • Academic Inspiration and a World Changing Idea
  • Government Support and Prototyping
  • Private Sector Support and Moving the Internet Out of the Lab
  • Privatizing and Scaling the Internet
  • Building the World Wide Web
  • The Internet as a Global Commons
  • Leiner, Cerf, et. al., A Brief History of the Internet – pp. 1-9
  • Week 2 Quiz

Week 3: Global Telecommunications Architecture and Governance

  • How Data Moves: Encapsulation
  • How Data Moves: Application Layer
  • How Data Moves: Network Layer
  • How Data Moves: Physical Layer1
  • What is Governance?
  • Governing the Internet
  • Vangie Beal “The 7 layers of the OSI Model”, Webopedia 
  • Joseph S. Nye, Jr. “The Regime Complex for Managing Global Cyber Activities”, Global Commission on Internet Governance“ 2014
  • Assante & Bochman “IoT, Automation, Autonomy, and Megacities in 2025: A Dark Preview”, Center for Strategic & International Studies, April 2017
  • Fischer, “The Internet of Things: Frequently Asked Questions” Congressional Research Service, Oct 2015
  • Week 3 Quiz

Week 4: Threat Actors and Their Motivations

  • Threat Actors: Who Are the Hackers?
  • Threat Actors: Hobbyists
  • Threat Actors: Criminal Organizations
  • Cyber Crime Case Study: The San Francisco Muni Attack
  • Threat Actors: Hacktivists
  • Threat Actors: Advanced Persistent Threats
  • Cybersecurity Threats Impacting the Nation
  • Fire Eye, “APT28 Cybergroup Activity” 
  • Lillian Ablon, Martin C. Libicki, Andrea A. Golay, Markets for cybercrime tools and stolen data, RAND Corporation 
  • Week 4 Quiz

Week 5: The Hacking Process

  • Hacking As a Process
  • Reconnaissance
  • Weaponization
  • Delivery
  • Exploitation and Installation
  • Command and Control
  • Effects
  • Lockheed Martin Cyber Kill chain 
  • MITRE ATT&CK Framework1h
  • Boebert, W. Earl, “A Survey of Challenges in Attribution,” in National Research Council, Proceedings of a Workshop on Deterring Cyberattacks, 2010, pp. 41-
  • Week 5 Quiz

Week 6: End Effects – Direct and Indirect Consequences

  • Framing Effects
  • Primary Effects
  • Secondary Effects
  • Second Level Effect
  • A Strategic Approach to Cybersecurity
  • Harry, C & Gallagher, N “ Classifying Cyber Events: A Proposed Taxonomy” , CISSM
  • Week 6 Quiz

Get Course Enrolment Link

Download will begin automatically in 60 seconds.

Generating Download Link…

Enroll on Coursera

Cybersecurity for Everyone

In our experience, we suggest you enroll in Cybersecurity for Everyone courses and gain some new skills from Professionals completely free and we assure you will be worth it.

Cybersecurity for Everyone course is available on Coursera and Courselers at Discounted Price, just visit Courselers to get Cybersecurity for Everyone

Conclusion:

I hope this Cybersecurity for Everyone Course would be useful for you to learn something new from this Course. If it helped you then don’t forget to bookmark our site for more Free and Discounted Courses

This course is intended for audiences of all experiences who are interested in learning about new skills in a business context; there are no prerequisite courses.

Keep Learning!

More Free Courses >>

AWS Certified Security Specialty 2022 Free Download

Part 2: AWS Certified Solutions Architect SAA C02 Free Download

Part 1: AWS Certified Solutions Architect SAA C02 Free Download

Amazon Web Services (AWS) Certified 2022 – 4 Certifications! Free Download

Leave a Reply

Your email address will not be published.