Cybersecurity and Mobility

Product type

Cybersecurity and Mobility

Coursera (CC)
Logo Coursera (CC)
Provider rating: starstarstarstar_halfstar_border 7.2 Coursera (CC) has an average rating of 7.2 (out of 6 reviews)

Need more information? Get more details on the site of the provider.

Description

When you enroll for courses through Coursera you get to choose for a paid plan or for a free plan

  • Free plan: No certicification and/or audit only. You will have access to all course materials except graded items.
  • Paid plan: Commit to earning a Certificate—it's a trusted, shareable way to showcase your new skills.

About this course: This course is for you if you are interested in transitioning toward a managerial role in cybersecurity and mobility. Through interviews with industry experts in this area, you will be able to analyze innovations powering the rapid spread of information technology and how they present new challenges for protecting data. For example, mobile devices increase convenience but often bypass traditional security measures. After this course, you will be able to describe how the nature of the threat evolves, as culprits employ a burgeoning set of sophisticated tools to take advantage of our growing reliance on networks for critical-data exchange. If you want to pursue a career…

Read the complete description

Frequently asked questions

There are no frequently asked questions yet. If you have any more questions or need help, contact our customer service.

When you enroll for courses through Coursera you get to choose for a paid plan or for a free plan

  • Free plan: No certicification and/or audit only. You will have access to all course materials except graded items.
  • Paid plan: Commit to earning a Certificate—it's a trusted, shareable way to showcase your new skills.

About this course: This course is for you if you are interested in transitioning toward a managerial role in cybersecurity and mobility. Through interviews with industry experts in this area, you will be able to analyze innovations powering the rapid spread of information technology and how they present new challenges for protecting data. For example, mobile devices increase convenience but often bypass traditional security measures. After this course, you will be able to describe how the nature of the threat evolves, as culprits employ a burgeoning set of sophisticated tools to take advantage of our growing reliance on networks for critical-data exchange. If you want to pursue a career in the public sector, the stakes are high as well. The proliferation of hackers, inevitable human errors, bring-your-own-device (BYOD) initiatives, and the ever-broadening need to share information weigh heavily on government and education organizations, and consume substantial resources. The Pentagon, for example, has proposed to spend $23 billion on network security initiatives through 2018. This sounds like a large sum, until you consider the scope and importance of the U.S. government information resources this investment must protect. After completing the course modules you will be able to explain how yesterday’s prevention strategies are no longer adequate for stopping advanced, targeted attacks. Effective cybersecurity must be multi-dimensional and tiered, as threats can originate from virtually anywhere, target numerous levels of an organization, and sometimes persist for months or years before an information security staff is aware of an attack or breach. Therefore securing networks requires a holistic approach that incorporates several elements.

Who is this class for: This course is primarily aimed for learners who are interested in transitioning toward a more managerial role in cybersecurity, and are therefore interested in understanding the interplay between business strategy and the IT infrastructure.

Created by:  University System of Georgia
  • Taught by:  Dr. Humayun Zafar, Associate Professor of Information Security and Assurance

    Information Systems
Basic Info Course 1 of 4 in the Cybersecurity: Developing a Program for Your Business Specialization Level Beginner Commitment 4 weeks of study, 2-3 hours/week Language English How To Pass Pass all graded assignments to complete the course. User Ratings 4.3 stars Average User Rating 4.3See what learners said Coursework

Each course is like an interactive textbook, featuring pre-recorded videos, quizzes and projects.

Help from your peers

Connect with thousands of other learners and debate ideas, discuss course material, and get help mastering concepts.

Certificates

Earn official recognition for your work, and share your success with friends, colleagues, and employers.

University System of Georgia The University System of Georgia is composed of 28 higher education institutions including 4 research universities, 2 regional universities, 12 state universities, 13 state colleges and the Skidaway Institute of Oceanography. The Georgia Public Library System, encompassing 61 library systems throughout Georgia, is also part of the University System.

Syllabus


WEEK 1


Welcome to the Course!



Welcome! In this module, you will be introduced to cybersecurity, mobility, and to the organization for this course. You will also see Chris and Mandy from SAP for the first time. They will be with us throughout the course. At the end of the module, you will have a chance to gauge your incoming knowledge of some of the concepts that will be presented in this course. If you struggle to answer any of the questions in this quiz, that's good! That means this course will be a good fit for you, where you will learn these answers and more! Also, all videos in this course have embedded quizzes. Hope you enjoy the learning process.


3 videos, 6 readings, 1 practice quiz expand


  1. Video: Welcome Video
  2. Reading: Learning Objectives
  3. Video: Next Steps – How to Successfully Complete This Course
  4. Reading: Mobility is Changing the World
  5. Reading: What is Cybersecurity?
  6. Practice Quiz: Cybersecurity Reading Quiz
  7. Discussion Prompt: What is Your Cybersecurity Takeaway?
  8. Video: SAP's Chris and Mandy on Corporate Mobility Trends
  9. Reading: Enterprise Mobility and Its impact on IT
  10. Reading: CIO Strategies for Consumerization:The Future of Enterprise Mobile Computing
  11. Reading: Managing Employees’ Use of Mobile Technologies to Minimize Work-Life Balance Impacts
  12. Discussion Prompt: Your Background, Goals, and Expectations

Graded: Challenge Your Existing Knowledge!

WEEK 2


Mobility Inc.



In this module you will be exposed to everything that is mobility. You will learn that mobility is not just about smartphones and tablets. In the context of the Internet of Things, it has become a much broader concept. You will also be introduced to how the entire global workforce trend toward mobility changes the way businesses operate.


6 videos, 4 readings expand


  1. Video: What is BYOD?
  2. Reading: Learning Objectives
  3. Video: Mobility and Cloud Computing
  4. Video: Mobility and Globalization
  5. Video: Mobility and the Modern Workforce
  6. Video: Mobility and the Internet of Things
  7. Video: SAP's Chris and Mandy on BYOD and Policy Management
  8. Reading: Mobility and the Internet of Things – CIO Executive Interview
  9. Reading: Using Mobile Technology to Improve Maternal Health and Fight Ebola: A Case Study of Mobile Innovation in Nigeria.
  10. Reading: Increasing Organizational Performance by Transforming into a Mobile Enterprise
  11. Discussion Prompt: Work-Life Balance. Does it Exist?

Graded: Mobility Inc. Quiz

WEEK 3


Cybersecurity



In this module we will cover issues pertaining to cybersecurity and its relevance in today’s connected world. You will learn how mobility has been a true game changer in relation to the cyber realm. Corporate IT boundaries are no longer constrained to a building. Increasingly, more and more people have the capacity to connect remotely using various means. This absolutely has cybersecurity implications.


3 videos, 5 readings, 1 practice quiz expand


  1. Video: Importance of Cybersecurity
  2. Reading: Learning Objectives
  3. Video: SAP's Chris and Mandy on Mobility, Cybersecurity, and IoT
  4. Reading: Cybersecurity in the Age of Mobility: Building a Mobile Infrastructure that Promotes Productivity
  5. Reading: Why IT Executives Should Help Employees Secure Their Home Computers
  6. Practice Quiz: Home Computer Security Reading Quiz
  7. Reading: Effective Information Security Requires a Balance of Social and Technology Factors.
  8. Video: The Mobility Threat Ecosystem
  9. Reading: The Evolution of Information Governance at Intel

Graded: Cybersecurity, Mobility, and IoT Discussion
Graded: Cybersecurity Quiz

WEEK 4


What's Next?



In this module we will cover areas that point to the future of cybersecurity and mobility. Mobility will continue to evolve as will IoT and things that are not even on our radar presently. For that reason you will be introduced to the Gartner Hype Cycle, which will provide you with a view industry usually has about various technologies and how they may fare in the long term.


5 videos, 5 readings, 1 practice quiz expand


  1. Video: The Gartner Hype Cycle
  2. Reading: Learning Objectives
  3. Video: SAP's Chris and Mandy on the Future of Mobility and Cybersecurity
  4. Reading: IT Consumerization: When Gadgets Turn into Enterprise IT Tools.
  5. Practice Quiz: IT Consumerization Reading Quiz
  6. Reading: Cybersecurity and Mobility: Securing the Mobile Frontier
  7. Reading: Achieving High Performance in a Mobile and Green Workplace: Lessons from Microsoft Netherlands
  8. Video: The Future of Cybersecurity
  9. Video: The Future of Mobility
  10. Reading: The Future of Mobility: Scenarios for the United States in 2030.
  11. Discussion Prompt: Share your knowledge
  12. Video: Video Conclusion

Graded: Final Quiz
There are no reviews yet.

    Share your review

    Do you have experience with this course? Submit your review and help other people make the right choice. As a thank you for your effort we will donate $1.- to Stichting Edukans.

    There are no frequently asked questions yet. If you have any more questions or need help, contact our customer service.