Cybersecurity Policy for Water and Electricity Infrastructures
Description
When you enroll for courses through Coursera you get to choose for a paid plan or for a free plan .
- Free plan: No certicification and/or audit only. You will have access to all course materials except graded items.
- Paid plan: Commit to earning a Certificate—it's a trusted, shareable way to showcase your new skills.
About this course: This course will examine the drinking water and electricity infrastructures, and various policies that have been developed to help guide and strengthen their cybersecurity programs. The drinking water and electricity infrastructures are two of fourteen subsectors comprising what are known as "lifeline infrastructure". The 2013 National Infrastructure Protection Plan identifies four lifeline infrastructure sectors: 1) water, 2) energy, 3) transportation, and 4) communications. These sectors are designated "lifeline" because many other infrastructures depend upon them. The drinking water subsector is part of the water sector, and the electricity subsector is part of the…
Frequently asked questions
There are no frequently asked questions yet. If you have any more questions or need help, contact our customer service.
When you enroll for courses through Coursera you get to choose for a paid plan or for a free plan .
- Free plan: No certicification and/or audit only. You will have access to all course materials except graded items.
- Paid plan: Commit to earning a Certificate—it's a trusted, shareable way to showcase your new skills.
About this course: This course will examine the drinking water and electricity infrastructures, and various policies that have been developed to help guide and strengthen their cybersecurity programs. The drinking water and electricity infrastructures are two of fourteen subsectors comprising what are known as "lifeline infrastructure". The 2013 National Infrastructure Protection Plan identifies four lifeline infrastructure sectors: 1) water, 2) energy, 3) transportation, and 4) communications. These sectors are designated "lifeline" because many other infrastructures depend upon them. The drinking water subsector is part of the water sector, and the electricity subsector is part of the energy sector. Both subsectors are overseen by the Department of Homeland Security National Protection and Programs Directorate which manages the DHS National Infrastructure Protection Program. The NIPP employs a five-step continuous improvement program called the Risk Management Framework. NIPP implementation is overseen by DHS-designated Sector-Specific Agencies staffed by various Federal departments. The Sector-Specific Agencies work in voluntary cooperation with industry representatives to apply the Risk Management Framework and document results in corresponding Sector-Specific Plans. The program began in 2007 and the most recent Sector-Specific Plans were published in 2016. In February 2013, President Obama issued Executive 13636 directing the National Institute of Standards and Technology to develop a voluntary set of recommendations for strengthening infrastructure cybersecurity measures. EO13636 also asked Federal agencies with regulating authority to make a recommendation whether the NIST Cybersecurity Framework should be made mandatory. The Environmental Protection Agency who is both the SSA and regulatory authority for the drinking water subsector recommended voluntary application of the NIST Cybersecurity Framework. The Department of Energy who is both the SSA and regulatory authority for the electricity subsector replied that it was already implementing the Electricity Subsector Cybersecurity Capability Maturity Model, which indeed was what the NIST Cybersecurity Framework was based on. The Department of Energy, though, recommended voluntary application of the ES-C2M2. This module will examine both the drinking water and electricity lifeline infrastructure subsectors, and elements and application of the NIST Cybersecurity Framework and ES-C2M2.
Who is this class for: This course was designed for learners who currently work in the cybersecurity career field, are interested in working in the cybersecurity career field, or are just curious about the topic. While there are no specific prerequisites for this course, it does assume some common understanding about computers and the Internet. Similarly, while this is mostly a non-technical course, it does require analytical and problem-solving skills on the part of the learner. This course provides a general overview of cybersecurity as it relates to critical infrastructure protection and homeland security. In addition to examining various cybersecurity policies as they apply to the water, electricity, aviation, and Internet infrastructures, this course relates those practices to the broader mission of critical infrastructure protection identifying "who's who and what do they do". This course seeks to demonstrate the intimate relationship between homeland security and cybersecurity. If you are ready to pry open that Pandora's box, then this course is for you. I look forward to seeing you in the lectures. Cheers!
Created by: University of Colorado System-
Taught by: Richard White, Assistant Research Professor
Computer Science
Each course is like an interactive textbook, featuring pre-recorded videos, quizzes and projects.
Help from your peersConnect with thousands of other learners and debate ideas, discuss course material, and get help mastering concepts.
CertificatesEarn official recognition for your work, and share your success with friends, colleagues, and employers.
University of Colorado System The University of Colorado is a recognized leader in higher education on the national and global stage. We collaborate to meet the diverse needs of our students and communities. We promote innovation, encourage discovery and support the extension of knowledge in ways unique to the state of Colorado and beyond.Syllabus
WEEK 1
Module 5: Water Infrastructure & NIST Cybersecurity Framework
In this module we will examine the drinking water subsector and the NIST Cybersecurity Framework for strengthening this infrastructure's cybersecurity practices.
3 videos, 3 readings, 2 practice quizzes expand
- Video: Course 2 Introduction
- Video: L11 Water Infrastructure
- Reading: Water: International Perspective (Optional Video)
- Practice Quiz: L11 Challenge Questions
- Video: L12 NIST Cybersecurity Framework
- Reading: NIST Cybersecurity Framework (Optional)
- Reading: on NIST CSF (Optional Video)
- Practice Quiz: L12 Challenge Questions
- Discussion Prompt: What do you think?
WEEK 2
Module 6: Applied NIST Cybersecurity Framework
In this module we will take a closer look at the NIST Cybersecurity Framework and apply its tenets to different hypothetical situations. Also included in this module is course exam #3. Good luck!
3 videos, 3 practice quizzes expand
- Video: L13 Applying NIST CSF (1)
- Practice Quiz: L13 Challenge Questions
- Video: L14 Applying NIST CSF (2)
- Practice Quiz: L14 Challenge Questions
- Video: L15 Applying NIST CSF (3)
- Practice Quiz: L15 Challenge Questions
- Discussion Prompt: What do you think?
Graded: Exam 3
WEEK 3
Module 7: Electricity Infrastructure & ES-C2M2
In this module we will examine the North American electric grid and the Electricity Subsector Cyber Capability Maturity Model for strengthening this infrastructure's cybersecurity practices.
2 videos, 3 readings, 2 practice quizzes expand
- Video: L16 Electricity Infrastructure
- Reading: Protecting Electricity Infrastructure (Optional Video)
- Practice Quiz: L16 Challenge Questions
- Video: L17 Electricity Subsector Cybersecurity Capability Maturity Model
- Reading: ES-C2M2 (Optional)
- Reading: Electricity Cyber Risk Management (Optional Video)
- Practice Quiz: L17 Challenge Questions
- Discussion Prompt: What do you think?
WEEK 4
Module 8: Applied ES-C2M2
In this module we will take a closer look at the Electricity Subsector Cyber Capability Maturity Model and apply its tenets to different hypothetical situations. Also included in this module is course exam #4 and related project assignment. Good luck!
3 videos, 3 practice quizzes expand
- Video: L18 Applying ES-C2M2 (1)
- Practice Quiz: L18 Challenge Questions
- Video: L19 Applying ES-C2M2 (2)
- Practice Quiz: L19 Challenge Questions
- Video: L20 Applying ES-C2M2 (3)
- Practice Quiz: L20 Challenge Questions
- Discussion Prompt: What do you think?
Graded: Exam 4
Graded: Starting a Cybersecurity Program
Share your review
Do you have experience with this course? Submit your review and help other people make the right choice. As a thank you for your effort we will donate $1.- to Stichting Edukans.There are no frequently asked questions yet. If you have any more questions or need help, contact our customer service.