About this Course
11,013 recent views

100% online

Start instantly and learn at your own schedule.

Flexible deadlines

Reset deadlines in accordance to your schedule.

Beginner Level

Approx. 9 hours to complete

Suggested: 4 weeks of study, 3-4 hours/week...

English

Subtitles: English

100% online

Start instantly and learn at your own schedule.

Flexible deadlines

Reset deadlines in accordance to your schedule.

Beginner Level

Approx. 9 hours to complete

Suggested: 4 weeks of study, 3-4 hours/week...

English

Subtitles: English

Syllabus - What you will learn from this course

Week
1
3 hours to complete

Introduction to the X-Factor

4 videos (Total 16 min), 5 readings, 2 quizzes
5 readings
Learning Objectives1m
MISQ Executive: Information Security Management Overview45m
Phishing Attacks Hurt Convenience Of Online Banking In The Workplace10m
3 things every CISO should know10m
Shadow IT: Mitigating Security Risks10m
1 practice exercise
Introduction to the X-Factor Quiz10m
Week
2
2 hours to complete

Security Education: Training & Awareness

4 videos (Total 17 min), 4 readings, 2 quizzes
4 readings
Learning Objectives1m
Security Education, Training and Awareness20m
Training20m
Making Security Awareness Work20m
2 practice exercises
SETA Practice Quiz20m
Security Education: Training and Awareness Quiz10m
Week
3
4 hours to complete

Reasons Why Traditional Training Efforts Fail

4 videos (Total 15 min), 5 readings, 3 quizzes
5 readings
Learning Objectives1m
Why Do Cybersecurity Awareness Campaigns Fail?50m
The Impact of Past Behavior45m
How Does Behavior Become Habitual?20m
Global Threat Report30m
2 practice exercises
Why Do Cybersecurity Awareness Campaigns Fail Quiz14m
Test Your Knowledge!20m
Week
4
2 hours to complete

Threat Intelligence

3 videos (Total 14 min), 6 readings, 2 quizzes
6 readings
Learning Objectives1m
What is threat intelligence?20m
Rise of Hacktivism20m
Cyber Insurance15m
Protecting yourself from Ransomware10m
Ransomware15m
2 practice exercises
Practice quiz: Test your threat intelligence!20m
Test your knowledge of threat intelligence10m
4.6
23 ReviewsChevron Right

25%

started a new career after completing these courses

25%

got a tangible career benefit from this course

Top reviews from Cybersecurity and the X-Factor

By ZLMar 19th 2017

There is a lot of practical and actionable information in this course related to cybersecurity. I would highly recommend anyone interested in their organization's cybersecurity take this course!

By JRApr 17th 2017

Great course, understanding that our biggest security threat is our own behaviour is key to building cybersecurity.

Instructors

Avatar

Dr. Humayun Zafar

Associate Professor of Information Security and Assurance
Information Systems
Avatar

Dr. Traci Carte

Associate Professor Chair, Information Systems
Information Systems
Avatar

Herbert J. Mattord, Ph.D., CISM, CISSP, CDP

Associate Professor in Information Security and Assurance
Information Systems
Avatar

Mr. Andy Green

Lecturer of Information Security and Assurance
Kennesaw State University - Department of Information Systems
Avatar

Michael Whitman, Ph.D., CISM, CISSP

Professor of Information Security
Information Systems

About University System of Georgia

The University System of Georgia is composed of 28 higher education institutions including 4 research universities, 2 regional universities, 12 state universities, 13 state colleges and the Skidaway Institute of Oceanography. The Georgia Public Library System, encompassing 61 library systems throughout Georgia, is also part of the University System....

About the Cybersecurity: Developing a Program for Your Business Specialization

Cybersecurity is an essential business skill for the evolving workplace. For-profit companies, government agencies, and not-for-profit organizations all need technologically proficient, business-savvy information technology security professionals. In this Specialization, you will learn about a variety of processes for protecting business assets through policy, education and training, and technology best practices. You’ll develop an awareness of the risks and cyber threats or attacks associated with modern information usage, and explore key technical and managerial topics required for a balanced approach to information protection. Topics will include mobility, the Internet of Things, the human factor, governance and management practices....
Cybersecurity: Developing a Program for Your Business

Frequently Asked Questions

  • Once you enroll for a Certificate, you’ll have access to all videos, quizzes, and programming assignments (if applicable). Peer review assignments can only be submitted and reviewed once your session has begun. If you choose to explore the course without purchasing, you may not be able to access certain assignments.

  • When you enroll in the course, you get access to all of the courses in the Specialization, and you earn a certificate when you complete the work. Your electronic Certificate will be added to your Accomplishments page - from there, you can print your Certificate or add it to your LinkedIn profile. If you only want to read and view the course content, you can audit the course for free.

More questions? Visit the Learner Help Center.