Online Course
Cybersecurity and the X-Factor
University System of Georgia via Coursera
-
183
-
- Write review
Overview
Class Central Tips
This course will introduce you to the types of training available to reduce the impact of the X-Factor, evaluate its effectiveness, explore the Security Education, Training and Awareness (SETA) program, and learn why it may fail. The course will conclude with information designed to assist you with some critical components for your business security program. Activities focused on hactivism, cyberinsurance, and ransomware will round out your knowledge base. Your team of instructors has prepared a series of readings, discussions, guest lectures, and quizzes to engage you in this exciting topic.
Syllabus
-The X-factor within information security is human behavior within and outside your organization. Our introduction includes an overview of information security management and its goals as well as describing the problem created by non-malicious insider behavior. We include discussion about the purpose of training within organizational cybersecurity efforts and whether it is achieving its purpose.
Security Education: Training & Awareness
-Within this topic we will discuss traditional training efforts. Security education, training and awareness (SETA) programs are designed to reduce the incidence of accidental security breaches. Through the readings you will learn about the design and delivery of these programs as well as various training techniques. This module concludes with a discussion about your experience and opinion about organizational security training.
Reasons Why Traditional Training Efforts Fail
-In this module you will understand why traditional training efforts through SETA programs may fail. You will learn about human behavior and how understanding it can help managers better leverage their security efforts. Finally, through the readings you will also see that this is a global issue. The readings present examples of existing awareness campaigns in U.K., in Australia, in Canada and Africa.
Threat Intelligence
-We will conclude by identifying some novel problems and practices that organizations are experiencing. You will learn about hactivism, cyberinsurance, and ransomware through popular press readings about recent security problems that landed companies on the front page.
Taught by
Dr. Humayun Zafar, Dr. Traci Carte, Herbert J. Mattord, Ph.D., CISM, CISSP, CDP and Mr. Andy Green
Related Courses
-
Cybersecurity: Developing a Program for Your Business
University System of Georgia
-
The Business of Cybersecurity Capstone
University System of Georgia
-
Cybersecurity and the Internet of Things
University System of Georgia
-
Cybersecurity and Mobility
University System of Georgia
1.0 -
Managing Cybersecurity
University System of Georgia
-
Cybersecurity and Its Ten Domains
University System of Georgia
2.9
Reviews
0.0 rating, based on 0 reviews