- Level Foundation
- Duration 14 hours
- Course by Kennesaw State University
-
Offered by
About
This course is for you if you are interested in transitioning toward a managerial role in cybersecurity and mobility. Through interviews with industry experts in this area, you will be able to analyze innovations powering the rapid spread of information technology and how they present new challenges for protecting data. For example, mobile devices increase convenience but often bypass traditional security measures. After this course, you will be able to describe how the nature of the threat evolves, as culprits employ a burgeoning set of sophisticated tools to take advantage of our growing reliance on networks for critical-data exchange. If you want to pursue a career in the public sector, the stakes are high as well. The proliferation of hackers, inevitable human errors, bring-your-own-device (BYOD) initiatives, and the ever-broadening need to share information weigh heavily on government and education organizations, and consume substantial resources. The Pentagon, for example, has proposed to spend $23 billion on network security initiatives through 2018. This sounds like a large sum, until you consider the scope and importance of the U.S. government information resources this investment must protect. After completing the course modules you will be able to explain how yesterday's prevention strategies are no longer adequate for stopping advanced, targeted attacks. Effective cybersecurity must be multi-dimensional and tiered, as threats can originate from virtually anywhere, target numerous levels of an organization, and sometimes persist for months or years before an information security staff is aware of an attack or breach. Therefore securing networks requires a holistic approach that incorporates several elements.Modules
Welcome to Cybersecurity and Mobility!
2
Assignment
- Cybersecurity Reading Quiz
- Challenge Your Existing Knowledge!
2
Discussions
- What is Your Cybersecurity Takeaway?
- Your Background, Goals, and Expectations
3
Videos
- Welcome Video
- Next Steps – How to Successfully Complete This Course
- SAP's Chris and Mandy on Corporate Mobility Trends
7
Readings
- Learning Objectives
- Mobility is Changing the World
- What is Cybersecurity?
- Enterprise Mobility and Its impact on IT
- CIO Strategies for Consumerization:The Future of Enterprise Mobile Computing
- Managing Employees’ Use of Mobile Technologies to Minimize Work-Life Balance Impacts
- Get help and meet other learners in this course. Join your discussion forums!
Mobility Inc.
1
Assignment
- Mobility Inc. Quiz
1
Discussions
- Work-Life Balance. Does it Exist?
6
Videos
- What is BYOD?
- Mobility and Cloud Computing
- Mobility and Globalization
- Mobility and the Modern Workforce
- Mobility and the Internet of Things
- SAP's Chris and Mandy on BYOD and Policy Management
4
Readings
- Learning Objectives
- Mobility and the Internet of Things – CIO Executive Interview
- Using Mobile Technology to Improve Maternal Health and Fight Ebola: A Case Study of Mobile Innovation in Nigeria.
- Increasing Organizational Performance by Transforming into a Mobile Enterprise
Cybersecurity
2
Assignment
- Home Computer Security Reading Quiz
- Cybersecurity Quiz
1
Peer Review
- Cybersecurity, Mobility, and IoT Discussion
3
Videos
- Importance of Cybersecurity
- SAP's Chris and Mandy on Mobility, Cybersecurity, and IoT
- The Mobility Threat Ecosystem
5
Readings
- Learning Objectives
- Cybersecurity in the Age of Mobility: Building a Mobile Infrastructure that Promotes Productivity
- Why IT Executives Should Help Employees Secure Their Home Computers
- Effective Information Security Requires a Balance of Social and Technology Factors.
- The Evolution of Information Governance at Intel
What's Next?
2
Assignment
- IT Consumerization Reading Quiz
- Final Quiz
1
Discussions
- Share your knowledge
5
Videos
- The Gartner Hype Cycle
- SAP's Chris and Mandy on the Future of Mobility and Cybersecurity
- The Future of Cybersecurity
- The Future of Mobility
- Video Conclusion
5
Readings
- Learning Objectives
- IT Consumerization: When Gadgets Turn into Enterprise IT Tools.
- Cybersecurity and Mobility: Securing the Mobile Frontier
- Achieving High Performance in a Mobile and Green Workplace: Lessons from Microsoft Netherlands
- The Future of Mobility: Scenarios for the United States in 2030.
Auto Summary
Embark on a transformative journey with the "Cybersecurity and Mobility" course, tailored for aspiring managers in the rapidly evolving fields of cybersecurity and IT. Guided by expert insights, this course delves into the innovations driving the expansion of information technology and the resulting challenges in data protection. You'll uncover the complexities of securing mobile devices, which, while increasing convenience, often bypass traditional security frameworks. Ideal for those aiming to advance their careers in both the private and public sectors, this course underscores the critical importance of robust cybersecurity measures in an era marked by persistent threats and sophisticated attacks. Government entities and educational institutions, in particular, face significant risks due to increased hacker activities, human errors, and BYOD policies. The course highlights real-world examples, such as the Pentagon's substantial investment in network security, to emphasize the high stakes involved. Upon completion, you'll gain a comprehensive understanding of why outdated prevention strategies fall short against today's advanced threats. You'll learn to implement a multi-dimensional, tiered approach to cybersecurity, essential for protecting networks against persistent and varied attacks. With a duration of 840 minutes, the course is available through Coursera with flexible subscription options, including Starter, Professional, and Paid plans. This foundational-level course is perfect for professionals seeking to deepen their knowledge and enhance their skills in a field that is crucial to safeguarding our digital future.

Dr. Humayun Zafar, CEH, CISM, CRISC, PCIP