- Level Foundation
- Duration 19 hours
- Course by University of Colorado Boulder
-
Offered by
About
This course aims to help anyone interested in data science understand the cybersecurity risks and the tools/techniques that can be used to mitigate those risks. We will cover the distinctions between confidentiality, integrity, and availability, introduce learners to relevant cybersecurity tools and techniques including cryptographic tools, software resources, and policies that will be essential to data science. We will explore key tools and techniques for authentication and access control so producers, curators, and users of data can help ensure the security and privacy of the data. This course can be taken for academic credit as part of CU Boulder’s Master of Science in Data Science (MS-DS) degree offered on the Coursera platform. The MS-DS is an interdisciplinary degree that brings together faculty from CU Boulder’s departments of Applied Mathematics, Computer Science, Information Science, and others. With performance-based admissions and no application process, the MS-DS is ideal for individuals with a broad range of undergraduate education and/or professional experience in computer science, information science, mathematics, and statistics. Learn more about the MS-DS program at https://www.coursera.org/degrees/master-of-science-data-science-boulder.Modules
Introduction
1
Discussions
- Introduce Yourself
1
Videos
- Introduction
3
Readings
- Earn Academic Credit for your Work!
- Course Support
- Assessment Expectations
The CIA Triad and Cybersecurity Basics
1
Videos
- Introduce the CIA Triad and Cybersecurity Basics
1
Readings
- The CIA Triad
Apply Your Knowledge
1
Quiz
- Week 1: Basic Cybersecurity Concepts and Principles
Optional Networking Assignment: Cybersecurity Networking with LinkedIn and Twitter
2
Videos
- LinkedIn and Twitter for Professionals
- Join LinkedIn Cybersecurity Course Group and Post
3
Readings
- Create Your LinkedIn and Twitter Accounts
- Networking with LinkedIn and Twitter
- Assignment: Join Cybersecurity Course Group on LinkedIn and Submit Posts
Digital Reputation and Cyberstory
1
Videos
- Digital Reputation and Cyberstory, Google Yourself
3
Readings
- Your Online Reputation
- Exercise —What is Your Cyber Story?
- Exercise — Ungoogle Yourself and Set up Google Alerts
Passwords and Cybersecuirty
1
Videos
- Passwords and Cybersecuirty
1
Readings
- Passwords
Cryptography
1
Videos
- Basic Cryptography and Encryption
1
Readings
- Cryptography
Apply Your Knowledge
1
Peer Review
- Passwords or Cryptography Infographic
1
Quiz
- Week 2: Your Cyber Story and Your Public Data Profile
Hacking – White, Grey and Black Hackers
1
Videos
- Hacking — White Hat, Grey Hat and Black Hat Hackers
1
Readings
- Hackers
Iot and Cybersecurity
1
Videos
- IoT
1
Readings
- Internet of Things
Social Engineering
1
Videos
- Social Engineering
1
Readings
- Social Engineering
Apply Your Knowledge
1
Quiz
- Week 3: Wifi, IoT, Hacking, Data Breaches and Social Engineering
Optional Networking Assignment: LinkedIn Discussion
1
Readings
- LinkedIn Discussion: Hacking or IOT and Cybersecurity
Facial Recognition and 'Big Brother'
1
Videos
- Facial Recognition and 'Big Brother'
1
Readings
- Big Brother and Surveillance
Apply Your Knowledge
1
Quiz
- Week 4: The Ethics of Cyber Security
Optional Networking Assignment: Getting Yourself Out There with LinkedIn and Twitter
1
Videos
- Getting Yourself Out There on LinkedIn and Twitter
3
Readings
- Optional LinkedIn Discussion
- Cybersecurity Experts on Twitter
- Explore and Network
Cybersecurity Interview Questions
1
Videos
- Cybersecurity Interview Questions
2
Readings
- 40 Questions to Ask a Mentor
- Formulate 5 Interview Questions
Cybersecurity Interview
1
Videos
- Cybersecurity Interview Guidance
2
Readings
- 9 Tips on Conducting Great Interviews
- Conduct an Interview
Cybersecurity Interview Reflection
1
Peer Review
- Cybersecurity Expert Interview Flipgrid Reflection
1
Videos
- Cybersecurity Interview Reflection
1
Readings
- Reflecting Skills
Auto Summary
"Cybersecurity for Data Science" is a foundational IT & Computer Science course designed to equip data science enthusiasts with the skills to identify and mitigate cybersecurity risks. Taught by expert faculty from CU Boulder, it covers key concepts like confidentiality, integrity, availability, cryptographic tools, and access control techniques. Part of CU Boulder’s MS in Data Science, this 1140-minute course is available via Coursera with Starter and Professional subscription options, catering to individuals with diverse educational and professional backgrounds.

Al Pisano