About this Course
6,485 recent views

100% online

Start instantly and learn at your own schedule.

Flexible deadlines

Reset deadlines in accordance to your schedule.

Beginner Level

Approx. 9 hours to complete

Suggested: 4 weeks of study, 2-3 hours/week...

English

Subtitles: English

100% online

Start instantly and learn at your own schedule.

Flexible deadlines

Reset deadlines in accordance to your schedule.

Beginner Level

Approx. 9 hours to complete

Suggested: 4 weeks of study, 2-3 hours/week...

English

Subtitles: English

Syllabus - What you will learn from this course

Week
1
3 hours to complete

Welcome to the Course!

3 videos (Total 9 min), 6 readings, 2 quizzes
6 readings
Learning Objectives2m
Mobility is Changing the World17m
What is Cybersecurity?30m
Enterprise Mobility and Its impact on IT30m
CIO Strategies for Consumerization:The Future of Enterprise Mobile Computing10m
Managing Employees’ Use of Mobile Technologies to Minimize Work-Life Balance Impacts30m
2 practice exercises
Cybersecurity Reading Quiz16m
Challenge Your Existing Knowledge!30m
Week
2
3 hours to complete

Mobility Inc.

6 videos (Total 25 min), 4 readings, 1 quiz
6 videos
Mobility and the Modern Workforce3m
Mobility and the Internet of Things4m
SAP's Chris and Mandy on BYOD and Policy Management5m
4 readings
Learning Objectives2m
Mobility and the Internet of Things – CIO Executive Interview20m
Using Mobile Technology to Improve Maternal Health and Fight Ebola: A Case Study of Mobile Innovation in Nigeria.30m
Increasing Organizational Performance by Transforming into a Mobile Enterprise30m
1 practice exercise
Mobility Inc. Quiz30m
Week
3
5 hours to complete

Cybersecurity

3 videos (Total 14 min), 5 readings, 3 quizzes
5 readings
Learning Objectives2m
Cybersecurity in the Age of Mobility: Building a Mobile Infrastructure that Promotes Productivity30m
Why IT Executives Should Help Employees Secure Their Home Computers30m
Effective Information Security Requires a Balance of Social and Technology Factors.10m
The Evolution of Information Governance at Intel30m
2 practice exercises
Home Computer Security Reading Quiz16m
Cybersecurity Quiz30m
Week
4
4 hours to complete

What's Next?

5 videos (Total 12 min), 5 readings, 2 quizzes
5 readings
Learning Objectives2m
IT Consumerization: When Gadgets Turn into Enterprise IT Tools.30m
Cybersecurity and Mobility: Securing the Mobile Frontier30m
Achieving High Performance in a Mobile and Green Workplace: Lessons from Microsoft Netherlands30m
The Future of Mobility: Scenarios for the United States in 2030.1h 10m
2 practice exercises
IT Consumerization Reading Quiz16m
Final Quiz30m
4.4
57 ReviewsChevron Right

17%

got a tangible career benefit from this course

Top reviews from Cybersecurity and Mobility

By MTMay 14th 2017

Great Course and Great materials. Very insightful into this very deep subject of Cybersecurity and correlation with other aspects of Technology.

By EIJul 12th 2016

A good introduction to the subject of computer security and mobile security. More of a general subject and not vert in depth, but a great start.

Instructor

Avatar

Dr. Humayun Zafar

Associate Professor of Information Security and Assurance
Information Systems

About University System of Georgia

The University System of Georgia is composed of 28 higher education institutions including 4 research universities, 2 regional universities, 12 state universities, 13 state colleges and the Skidaway Institute of Oceanography. The Georgia Public Library System, encompassing 61 library systems throughout Georgia, is also part of the University System....

About the Cybersecurity: Developing a Program for Your Business Specialization

Cybersecurity is an essential business skill for the evolving workplace. For-profit companies, government agencies, and not-for-profit organizations all need technologically proficient, business-savvy information technology security professionals. In this Specialization, you will learn about a variety of processes for protecting business assets through policy, education and training, and technology best practices. You’ll develop an awareness of the risks and cyber threats or attacks associated with modern information usage, and explore key technical and managerial topics required for a balanced approach to information protection. Topics will include mobility, the Internet of Things, the human factor, governance and management practices....
Cybersecurity: Developing a Program for Your Business

Frequently Asked Questions

  • Once you enroll for a Certificate, you’ll have access to all videos, quizzes, and programming assignments (if applicable). Peer review assignments can only be submitted and reviewed once your session has begun. If you choose to explore the course without purchasing, you may not be able to access certain assignments.

  • When you enroll in the course, you get access to all of the courses in the Specialization, and you earn a certificate when you complete the work. Your electronic Certificate will be added to your Accomplishments page - from there, you can print your Certificate or add it to your LinkedIn profile. If you only want to read and view the course content, you can audit the course for free.

More questions? Visit the Learner Help Center.