Course

A Strategic Approach to Cybersecurity

University of Maryland, College Park

A Strategic Approach to Cybersecurity offers a comprehensive exploration of cybersecurity challenges and solutions, catering to a broad audience, from novices to experienced professionals. The course delves into the interconnectedness of private and public entities, providing a strategic framework for addressing cybersecurity concerns.

The course covers a range of crucial topics, including the complexities of private organizations, NIST functions, critical infrastructure, national response, and strategic consequences. Learners gain valuable insights into managing cybersecurity risk in organizations and critical infrastructure, as well as the policy considerations surrounding governance, privacy, and risk management.

  • Gain a thorough understanding of the interdependency of private and public entities in the cybersecurity landscape.
  • Explore the complexities of private organizations and the framework for practical action.
  • Learn about NIST functions, critical infrastructure, and national critical functions.
  • Understand the strategic consequences of cybersecurity issues and the interconnectedness of systems.

Certificate Available ✔

Get Started / More Info
A Strategic Approach to Cybersecurity
Course Modules

The course comprises six modules that cover a wide range of cybersecurity topics, including private and public sector contexts, critical infrastructure, and strategic consequences. Each module provides valuable insights for professionals at all levels, from novices to seasoned experts.

Defining a Strategic Approach to Cybersecurity (Week 1)

Module 1 introduces the foundational concepts of cybersecurity, providing an overview of a strategic approach to cybersecurity and its relevance in both private and public sector contexts. Learners gain insights into the challenges of assessing strategic cybersecurity risk in organizations and critical infrastructure.

Private Sector Context - Part 1 (Week 2)

Module 2 delves into the complexities of private organizations, exploring the interdependence and layered defense mechanisms. It also covers NIST functions, including identification and protection, and provides a framework for improving critical infrastructure cybersecurity.

Private Sector Context - Part 2 (Week 3)

Module 3 continues the exploration of the private sector context, focusing on NIST functions related to detection, response, and recovery. Learners also gain insights into strategic context and the development of cyber maturity.

Public Sector Context: Critical Infrastructure and National Response (Week 4)

Module 4 shifts the focus to the public sector, examining how governments perceive the cybersecurity problem, defining and categorizing critical infrastructure, and exploring government responses. The module also covers relevant policy directives and reports.

Protecting National Critical Functions (Week 5)

Module 5 delves into the protection of national critical functions, going beyond critical sectors to define and manage national critical functions. Learners gain insights into the strategic cyber effects in complex systems and relevant security memorandums.

From Device to National Critical Function: Identifying Strategic Consequence (Week 6)

Module 6 explores the concept of strategic consequence in cybersecurity, from individual devices to national critical functions. It provides insights into interdependency and relevant cybersecurity mitigation actions and testing.

More Computer Security and Networks Courses

Cybersecurity: Developing a Program for Your Business

University System of Georgia

Cybersecurity: Developing a Program for Your Business equips you with essential skills to protect business assets through policy, education, and technology best...

Decryption with Python

Coursera Project Network

Decryption with Python course helps you master decryption algorithms and techniques using Python for building a solid foundation in data decryption.

Tools of the Trade: Linux and SQL

Google

Tools of the Trade: Linux and SQL equips learners with essential computing skills for cybersecurity roles, covering Linux command line usage and SQL database querying....

Laravel Protections

Infosec

This course delves into Laravel's database protection and configuration, emphasizing security measures, performance optimization, and rate limiting.