MOOC List is learner-supported. When you buy through links on our site, we may earn an affiliate commission.
MOOC List is learner-supported. When you buy through links on our site, we may earn an affiliate commission.
After completing this course, a learner will be able to:
- Define key concepts and terminology in Cybersecurity
- Identify threats to cybersecurity
- Identify strategies to identify and remediate vulnerabilities in information assets
- Identify the systemic components (including personnel) necessary for an effective cybersecurity program
What You Will Learn
- Define key concepts and terminology in Cybersecurity
- Describe key threats to cybersecurity
- Define strategies to identify and remediate vulnerabilities in information assets
- Give examples of the systemic components (including personnel) necessary for an effective cybersecurity program
Course 1 of 5 in the Managing Cybersecurity Specialization .
Syllabus
WEEK 1
Welcome to The Foundations of Cybersecurity (Course 1)
This is an overview of the learning objectives for the course.
WEEK 2
Introduction to Cybersecurity (Module 1.1)
Learning Objectives for Introduction to Cybersecurity Module
WEEK 3
Threats to Cybersecurity (Module 1.2)
Learning objectives for Threats to Cybersecurity
WEEK 4
Security Technologies (Module 1.3)
WEEK 5
Managing Vulnerabilities in Information Assets (Module 1.4)
Learning objectives for Managing Vulnerabilities in Information Assets module
WEEK 6
Understanding the Cybersecurity Program (Module 1.5)
Learning Objectives for Managing Vulnerabilities in Information Assets Module
WEEK 7
Wrap-up for The Foundations of Cybersecurity
MOOC List is learner-supported. When you buy through links on our site, we may earn an affiliate commission.
MOOC List is learner-supported. When you buy through links on our site, we may earn an affiliate commission.