About this Course
38,667 recent views

100% online

Start instantly and learn at your own schedule.

Flexible deadlines

Reset deadlines in accordance to your schedule.

Beginner Level

Approx. 8 hours to complete

Suggested: 6 hours of videos, quizzes and peer review...

English

Subtitles: French, Chinese (Simplified), Greek, Italian, Portuguese (Brazilian), Vietnamese, Dutch, English, Persian...

Skills you will gain

CybersecurityCryptographyInformation Security (INFOSEC)Cyber-Security Regulation

100% online

Start instantly and learn at your own schedule.

Flexible deadlines

Reset deadlines in accordance to your schedule.

Beginner Level

Approx. 8 hours to complete

Suggested: 6 hours of videos, quizzes and peer review...

English

Subtitles: French, Chinese (Simplified), Greek, Italian, Portuguese (Brazilian), Vietnamese, Dutch, English, Persian...

Syllabus - What you will learn from this course

Week
1
1 hour to complete

Welcome and Course Overview

Checkout our marquee speaker. She's the Chief Privacy Officer at Coca Cola.

...
2 videos (Total 4 min), 3 readings, 1 quiz
2 videos
The Importance of Cybersecurity1m
3 readings
Welcome to the Course10m
Meet the Instructor10m
Course Objectives10m
1 practice exercise
Test Your Existing Knowledge20m
Week
2
6 hours to complete

Introduction to Security, Access Control, and Software Development Security

In this module we cover some of the fundamentals of security that will assist you throughout the course. We will then introduce you to two domains of cyber security: access control and software development security. Focus will be on areas such as confidentiality, integrity, and availability, as well secure software development techniques.

...
4 videos (Total 11 min), 1 reading, 2 quizzes
4 videos
Introduction to Security3m
Access Control2m
Software Development Security3m
1 reading
Module Readings3h 10m
1 practice exercise
Introduction to Security, Access Control, and Software Development Security Quiz28m
Week
3
5 hours to complete

Business Continuity and Disaster Recovery Planning and Cryptography

In this module we are going to delve a little deeper into cyber security by covering business continuity and disaster recovery planning and cryptography. Learners will be exposed to what a disruptive event is and how the federal government through agencies such as FEMA handles disasters. We will also covers encryption and decryption and the various techniques used.

...
3 videos (Total 5 min), 1 reading, 1 quiz
3 videos
Business Continuity and Disaster Recovery Planning2m
Cryptography1m
1 reading
Module Readings4h
1 practice exercise
Business Continuity and Disaster Recovery Planning and Cryptography Quiz36m
Week
4
4 hours to complete

Information Security Governance and Risk Management & Legal, Regulations, Investigations, and Compliance

In this module we are going to cover some of the non-technical topics associated to cyber security: Information security governance and risk management and legal, regulations, investigations, and compliance. It is important to realize, that non-technical does not mean easy, or not important. In fact, I would like to argue that they are more important that the technical side of cyber security.

...
3 videos (Total 5 min), 1 reading, 1 quiz
3 videos
Information Security Governance and Risk Management1m
Legal, Regulations, Investigations, and Compliance2m
1 reading
Module Readings3h 10m
1 practice exercise
Information Security Governance and Risk Management & Legal, Regulations, Investigations, and Compliance Quiz38m
4.2
363 ReviewsChevron Right

29%

started a new career after completing these courses

33%

got a tangible career benefit from this course

12%

got a pay increase or promotion

Top reviews from Cybersecurity and Its Ten Domains

By CBMay 4th 2018

The Cybersecurity course was very complete and interesting. I enjoyed forums and videos.\n\nThis course has motivated me to learn more about Information Security.\n\nExcellent content !\n\nRegards

By PPFeb 8th 2016

Superb course with lot of resources to learn concepts. websites really helpful to update knowledge. Simple rules will avoid hefty fines by govt and safeguard brand reputations

Instructor

Avatar

Dr. Humayun Zafar

Associate Professor of Information Security and Assurance
Information Systems

About University System of Georgia

The University System of Georgia is composed of 28 higher education institutions including 4 research universities, 2 regional universities, 12 state universities, 13 state colleges and the Skidaway Institute of Oceanography. The Georgia Public Library System, encompassing 61 library systems throughout Georgia, is also part of the University System....

Frequently Asked Questions

  • Once you enroll for a Certificate, you’ll have access to all videos, quizzes, and programming assignments (if applicable). Peer review assignments can only be submitted and reviewed once your session has begun. If you choose to explore the course without purchasing, you may not be able to access certain assignments.

  • When you purchase a Certificate you get access to all course materials, including graded assignments. Upon completing the course, your electronic Certificate will be added to your Accomplishments page - from there, you can print your Certificate or add it to your LinkedIn profile. If you only want to read and view the course content, you can audit the course for free.

More questions? Visit the Learner Help Center.