Class Deals by MOOC List - Click here and see Coursera's Active Discounts, Deals, and Promo Codes.
For example, mobile devices increase convenience but often bypass traditional security measures. As an upcoming manager, you will also learn how the nature of the threat evolves, as culprits employ a burgeoning set of sophisticated tools to take advantage of our growing reliance on networks for critical-data exchange.
If you want to pursue a career in the public sector, the stakes are high as well. The proliferation of hackers, inevitable human errors, bring-your-own-device (BYOD) initiatives, and the ever-broadening need to share information weigh heavily on government and education organizations, and consume substantial resources. The Pentagon, for example, has proposed to spend $23 billion on network security initiatives through 2018. This sounds like a large sum, until you consider the scope and importance of the U.S. government information resources this investment must protect.
Against this backdrop, this course will explain how yesterday’s prevention strategies are no longer adequate for stopping advanced, targeted attacks. Today, effective cybersecurity must be multi-dimensional and tiered, as threats can originate from virtually anywhere, target numerous levels of an organization, and sometimes persist for months or years before an information security staff is aware of an attack or breach. Therefore securing networks requires a holistic approach that incorporates several elements.
Course 1 of 4 in the Cybersecurity: Developing a Program for Your Business Specialization.
Welcome to the Course!
Welcome! In this module, you will be introduced to cybersecurity, mobility, and to the organization for this course. You will also see Chris and Mandy from SAP for the first time. They will be with us throughout the course. At the end of the module, you will have a chance to gauge your incoming knowledge of some of the concepts that will be presented in this course. If you struggle to answer any of the questions in this quiz, that's good! That means this course will be a good fit for you, where you will learn these answers and more! Also, all videos in this course have embedded quizzes. Hope you enjoy the learning process.
In this module you will be exposed to everything that is mobility. You will learn that mobility is not just about smartphones and tablets. In the context of the Internet of Things, it has become a much broader concept. You will also be introduced to how the entire global workforce trend toward mobility changes the way businesses operate.
In this module we will cover issues pertaining to cybersecurity and its relevance in today’s connected world. You will learn how mobility has been a true game changer in relation to the cyber realm. Corporate IT boundaries are no longer constrained to a building. Increasingly, more and more people have the capacity to connect remotely using various means. This absolutely has cybersecurity implications.
In this module we will cover areas that point to the future of cybersecurity and mobility. Mobility will continue to evolve as will IoT and things that are not even on our radar presently. For that reason you will be introduced to the Gartner Hype Cycle, which will provide you with a view industry usually has about various technologies and how they may fare in the long term.