This course is for you if you are interested in transitioning toward a managerial role in cybersecurity and mobility. Through interviews with industry experts in this area, you will be able to analyze innovations powering the rapid spread of information technology and how they present new challenges for protecting data. For example, mobile devices increase convenience but often bypass traditional security measures. After this course, you will be able to describe how the nature of the threat evolves, as culprits employ a burgeoning set of sophisticated tools to take advantage of our growing reliance on networks for critical-data exchange.
If you want to pursue a career in the public sector, the stakes are high as well. The proliferation of hackers, inevitable human errors, bring-your-own-device (BYOD) initiatives, and the ever-broadening need to share information weigh heavily on government and education organizations, and consume substantial resources. The Pentagon, for example, has proposed to spend $23 billion on network security initiatives through 2018. This sounds like a large sum, until you consider the scope and importance of the U.S. government information resources this investment must protect.
After completing the course modules you will be able to explain how yesterday’s prevention strategies are no longer adequate for stopping advanced, targeted attacks. Effective cybersecurity must be multi-dimensional and tiered, as threats can originate from virtually anywhere, target numerous levels of an organization, and sometimes persist for months or years before an information security staff is aware of an attack or breach. Therefore securing networks requires a holistic approach that incorporates several elements.
Welcome to the Course!
-Welcome! In this module, you will be introduced to cybersecurity, mobility, and to the organization for this course. You will also see Chris and Mandy from SAP for the first time. They will be with us throughout the course. At the end of the module, you will have a chance to gauge your incoming knowledge of some of the concepts that will be presented in this course. If you struggle to answer any of the questions in this quiz, that's good! That means this course will be a good fit for you, where you will learn these answers and more! Also, all videos in this course have embedded quizzes. Hope you enjoy the learning process.
-In this module you will be exposed to everything that is mobility. You will learn that mobility is not just about smartphones and tablets. In the context of the Internet of Things, it has become a much broader concept. You will also be introduced to how the entire global workforce trend toward mobility changes the way businesses operate.
-In this module we will cover issues pertaining to cybersecurity and its relevance in today’s connected world. You will learn how mobility has been a true game changer in relation to the cyber realm. Corporate IT boundaries are no longer constrained to a building. Increasingly, more and more people have the capacity to connect remotely using various means. This absolutely has cybersecurity implications.
-In this module we will cover areas that point to the future of cybersecurity and mobility. Mobility will continue to evolve as will IoT and things that are not even on our radar presently. For that reason you will be introduced to the Gartner Hype Cycle, which will provide you with a view industry usually has about various technologies and how they may fare in the long term.
Dr. Humayun Zafar, Dr. Traci Carte, Herbert J. Mattord, Ph.D., CISM, CISSP, CDP and Mr. Andy Green
I signed up for the class wanting to know more about cybersecurity issues relating to devices that are mobile - not just mobile phones, but also devices like laptops, tablets.
The annoying sound effects in the videos are one thing. The major issue I have with the course is that it is very shallow with so much fluff and little solid foundational content. It feels amateurish, as though an aspirational cybersecurity content producer with no knowledge and no original thought in the area put the course together. There are numerous links to external content and opinion interviews with people which are not very educational at all.
It's not a course. It's more of a trainwreck of an attempt at a TV documentary.