Oct 31st 2016

Cybersecurity and Mobility (Coursera)

Created by: Delivered by:

This course is for you if you are interested in transitioning toward a managerial role in cybersecurity and mobility. Through interviews with industry experts in this area, you will learn about innovations powering the rapid spread of information technology and how they present new challenges for protecting data.

For example, mobile devices increase convenience but often bypass traditional security measures. As an upcoming manager, you will also learn how the nature of the threat evolves, as culprits employ a burgeoning set of sophisticated tools to take advantage of our growing reliance on networks for critical-data exchange.

If you want to pursue a career in the public sector, the stakes are high as well. The proliferation of hackers, inevitable human errors, bring-your-own-device (BYOD) initiatives, and the ever-broadening need to share information weigh heavily on government and education organizations, and consume substantial resources. The Pentagon, for example, has proposed to spend $23 billion on network security initiatives through 2018. This sounds like a large sum, until you consider the scope and importance of the U.S. government information resources this investment must protect.

Against this backdrop, this course will explain how yesterday’s prevention strategies are no longer adequate for stopping advanced, targeted attacks. Today, effective cybersecurity must be multi-dimensional and tiered, as threats can originate from virtually anywhere, target numerous levels of an organization, and sometimes persist for months or years before an information security staff is aware of an attack or breach. Therefore securing networks requires a holistic approach that incorporates several elements.

Cybersecurity and Mobility is course 1 of 4 in the Cybersecurity: Developing a Program for Your Business Specialization.

Cybersecurity is an essential business skill for the evolving workplace. For-profit companies, government agencies, and not-for-profit organizations all need technologically proficient, business-savvy information technology security professionals. In this Specialization, you will learn about a variety of processes for protecting business assets through policy, education and training, and technology best practices. You’ll develop an awareness of the risks and cyber threats or attacks associated with modern information usage, and explore key technical and managerial topics required for a balanced approach to information protection. Topics will include security of mobile platforms, securing the Internet of Things, security as a product of the human factor, and security governance and management practices.