Cybersecurity for Everyone

Instructor: Charles Harry

Skills you'll gain

  •   Risk Management
  •   Data Security
  •   Threat Detection
  •   Cyber Security Policies
  •   Security Awareness
  •   Telecommunications
  •   Infrastructure Security
  •   Public Safety and National Security
  •   Political Sciences
  •   General Networking
  •   Cyber Governance
  •   Enterprise Security
  •   Cyber Security Strategy
  •   Cyber Risk
  •   Cybersecurity
  •   Governance
  •   Cyber Attacks
  •   Computer Security Awareness Training
  •   Security Management
  •   Vulnerability
  • There are 6 modules in this course

    Your instructor, Dr. Charles Harry, has served on the front lines with the NSA (National Security Agency) and as an expert advising corporate and institutional leaders on managing cybersecurity risk. And he brings a rare and engaging perspective to help you learn cybersecurity from the ground up. Cybersecurity for Everyone lays the groundwork to understand and explore the key issues facing policy makers attempting to manage the problem of cybersecurity, from its technical foundations to the domestic and international policy considerations surrounding governance, privacy, and risk management, to applications for achieving the goals of an enterprise, an institution, or a nation. This course is designed for students with some or no background in information technology, whether a novice or active in the cybersecurity field (engineers and computer scientists will learn the broader context and business aspects of cybersecurity), and will provide the principles to understand the current debates shaping a rapidly evolving security landscape.

    Cybersecurity for Everyone: Evolution of the Internet (Week 2)

    Cybersecurity for Everyone: Global Telecommunications Architecture and Governance (Week 3)

    Cybersecurity for Everyone: Threat Actors and Their Motivations (Week 4)

    Cybersecurity for Everyone: The Hacking Process (Week 5)

    Cybersecurity for Everyone: End Effects - Direct and Indirect Consequences (Week 6)

    Explore more from Computer Security and Networks

    ©2025  ementorhub.com. All rights reserved