Cybersecurity for Everyone

Instructor: Charles Harry

Skills you'll gain

  •   Political Sciences
  •   Security Management
  •   Vulnerability
  •   Cyber Security Policies
  •   Telecommunications
  •   Public Safety and National Security
  •   Governance
  •   Security Awareness
  •   Infrastructure Security
  •   Cyber Governance
  •   Cyber Risk
  •   Risk Management
  •   Data Security
  •   Computer Security Awareness Training
  •   Cyber Attacks
  •   Cybersecurity
  •   Threat Detection
  •   General Networking
  •   Enterprise Security
  •   Cyber Security Strategy
  • There are 6 modules in this course

    Your instructor, Dr. Charles Harry, has served on the front lines with the NSA (National Security Agency) and as an expert advising corporate and institutional leaders on managing cybersecurity risk. And he brings a rare and engaging perspective to help you learn cybersecurity from the ground up. Cybersecurity for Everyone lays the groundwork to understand and explore the key issues facing policy makers attempting to manage the problem of cybersecurity, from its technical foundations to the domestic and international policy considerations surrounding governance, privacy, and risk management, to applications for achieving the goals of an enterprise, an institution, or a nation. This course is designed for students with some or no background in information technology, whether a novice or active in the cybersecurity field (engineers and computer scientists will learn the broader context and business aspects of cybersecurity), and will provide the principles to understand the current debates shaping a rapidly evolving security landscape.

    Cybersecurity for Everyone: Evolution of the Internet (Week 2)

    Cybersecurity for Everyone: Global Telecommunications Architecture and Governance (Week 3)

    Cybersecurity for Everyone: Threat Actors and Their Motivations (Week 4)

    Cybersecurity for Everyone: The Hacking Process (Week 5)

    Cybersecurity for Everyone: End Effects - Direct and Indirect Consequences (Week 6)

    Explore more from Computer Security and Networks

    ©2025  ementorhub.com. All rights reserved