About this Course
4.8
39 ratings
12 reviews
Specialization
100% online

100% online

Start instantly and learn at your own schedule.
Flexible deadlines

Flexible deadlines

Reset deadlines in accordance to your schedule.
Beginner Level

Beginner Level

Hours to complete

Approx. 6 hours to complete

Suggested: This is Course 4 in a 4-course specialization. Estimated workload: 15-hours over 1-week....
Available languages

English

Subtitles: English
Specialization
100% online

100% online

Start instantly and learn at your own schedule.
Flexible deadlines

Flexible deadlines

Reset deadlines in accordance to your schedule.
Beginner Level

Beginner Level

Hours to complete

Approx. 6 hours to complete

Suggested: This is Course 4 in a 4-course specialization. Estimated workload: 15-hours over 1-week....
Available languages

English

Subtitles: English

Syllabus - What you will learn from this course

Week
1
Hours to complete
1 hour to complete

Module 13: Assessing Risk & Future Options

There is no cure for cyber attack and there is no absolute security. Accordingly, all cybersecurity entails risk management. In this module we will take a closer look at risk management and begin looking at alternatives to the cybersecurity problem....
Reading
4 videos (Total 24 min), 4 readings, 3 quizzes
Video4 videos
L31 Risk Analysis8m
L32 Reversion4m
L33 Conundrum7m
Reading4 readings
More Risk Methodologies (Optional Video)10m
More Cyber Threat to Infrastructure (Optional Video)10m
Limits of Quantum Computing (Optional)10m
Solving the Cyber Conundrum (Optional Video)10m
Quiz3 practice exercises
L31 Challenge Questions6m
L32 Challenge Questions6m
L33 Challenge Questions4m
Week
2
Hours to complete
1 hour to complete

Module 14: Responding to Cyber Attack

This module examines the cyber response capabilities of DHS and DoD. Also included in this module is course exam #7. Good luck!...
Reading
2 videos (Total 13 min), 3 readings, 3 quizzes
Video2 videos
L37 Military6m
Reading3 readings
Cyber Incident Response (Optional Video)10m
DHS NPPD (Optional)10m
Cyber Weapon (Optional Video)10m
Quiz3 practice exercises
L34 Challenge Questions6m
L37 Challenge Questions6m
Exam 730m
Week
3
Hours to complete
1 hour to complete

Module 15: Escaping the Cyber Trap

This module examines legal issues related to cyber crime and cyber surveillance. It also examines how critical infrastructure might eventually evolve and become immune to cyber attack....
Reading
3 videos (Total 18 min), 5 readings, 3 quizzes
Video3 videos
L36 Surveillance5m
L38 Mitigation6m
Reading5 readings
Estimating the Cost of Cybercrime (Optional)10m
More on Cybercrime (Optional Video)10m
NSA Surveillance Leaks (Optional)10m
Cybercrime Law Symposium (Optional Video)10m
Cyber Risk & Crisis Management (Optional Video)10m
Quiz3 practice exercises
L35 Challenge Questions4m
L36 Challenge Questions4m
L38 Challenge Questions6m
Week
4
Hours to complete
2 hours to complete

Module 16: Cyber Profession & Career

In this module we will take a look at the cyber profession and your future in the cyber career field. Also included in this module are the remaining course exam and project, and a comprehensive final exam. Please take your time and carefully consider your answers. Again, I wish you the best of luck. Cheers!...
Reading
2 videos (Total 9 min), 2 readings, 5 quizzes
Video2 videos
L40 Profession5m
Reading2 readings
Cyber Resilience (Optional Video)10m
Building Cyber Capability (Optional Video)10m
Quiz5 practice exercises
L39 Challenge Questions4m
L40 Challenge Questions2m
Exam 830m
Building Cybersecurity Capability4m
Final Exam20m
4.8
12 ReviewsChevron Right
Career direction

50%

started a new career after completing these courses
Career Benefit

83%

got a tangible career benefit from this course

Top Reviews

By SHOct 4th 2018

Excellent Course with great presentation and just the right pace. Great introduction to the field of cybersecurity.

By APSep 17th 2018

Interesting Thank you so much to the instructor for instructing Ana Pelayo.

Instructor

Avatar

Richard White

Assistant Research Professor
Computer Science

About University of Colorado System

The University of Colorado is a recognized leader in higher education on the national and global stage. We collaborate to meet the diverse needs of our students and communities. We promote innovation, encourage discovery and support the extension of knowledge in ways unique to the state of Colorado and beyond....

About the Homeland Security and Cybersecurity Specialization

Homeland security is about safeguarding the United States from domestic catastrophic destruction. Cybersecurity has emerged as a priority homeland security concern because a coordinated cyber attack against critical infrastructure could result in the worst catastrophe in the nation’s history. This specialization examines the cybersecurity problem, and takes a close look at what is being done to safeguard the United States from domestic catastrophic destruction by cyber attack. At the conclusion of this course, we hope learners grasp the central message that cybersecurity is essential to critical infrastructure protection, which is essential to homeland security, which is about safeguarding the United States from domestic catastrophic destruction....
Homeland Security and Cybersecurity

Frequently Asked Questions

  • Once you enroll for a Certificate, you’ll have access to all videos, quizzes, and programming assignments (if applicable). Peer review assignments can only be submitted and reviewed once your session has begun. If you choose to explore the course without purchasing, you may not be able to access certain assignments.

  • When you enroll in the course, you get access to all of the courses in the Specialization, and you earn a certificate when you complete the work. Your electronic Certificate will be added to your Accomplishments page - from there, you can print your Certificate or add it to your LinkedIn profile. If you only want to read and view the course content, you can audit the course for free.

  • In the process of restructuring this specialization to conform with Coursera design guidelines, it was decided that Lessons 35 and 36 were more appropriate to Module 15 instead of Module 14. Lesson place marks were added to Module 14 to note the move. Otherwise, no lessons were forgotten or harmed in making this specialization. :-)

More questions? Visit the Learner Help Center.