- Level Foundation
- Duration 22 hours
- Course by University of Maryland, College Park
-
Offered by
About
Cybersecurity affects everyone, including in the delivery of basic products and services. If you or your organization want to better understand how to address your cybersecurity, this is the course for you and your colleagues to take -- from seasoned professionals to your non-technical colleagues. Your instructor, Dr. Charles Harry, has served on the front lines with the NSA (National Security Agency) and as an expert advising corporate and institutional leaders on managing cybersecurity risk. And he brings a rare and engaging perspective to help you learn cybersecurity from the ground up. Cybersecurity for Everyone lays the groundwork to understand and explore the key issues facing policy makers attempting to manage the problem of cybersecurity, from its technical foundations to the domestic and international policy considerations surrounding governance, privacy, and risk management, to applications for achieving the goals of an enterprise, an institution, or a nation. This course is designed for students with some or no background in information technology, whether a novice or active in the cybersecurity field (engineers and computer scientists will learn the broader context and business aspects of cybersecurity), and will provide the principles to understand the current debates shaping a rapidly evolving security landscape.Modules
What is Cyber? (Week 1, Introduction & Lecture 1)
2
Videos
- Foundations: An Introduction
- What is Cyber?
1
Readings
- Optional Reading: Harry, C & Gallagher, N “ Classifying Cyber Events: A Proposed Taxonomy”
What is Security? (Week 1, Lecture 2)
1
Videos
- What is Security?
Demystifying the Cybersecurity Problem (Week 1, Lecture 3)
1
Videos
- Demystifying the Cybersecurity Problem
1
Readings
- National Research Council, “At the Nexus of Cybersecurity and Public Policy”, Ch. 1
The Threat Landscape (Week 1, Lecture 4)
1
Videos
- The Threat Landscape
Threat Landscape Challenge (Week 1, Lecture 5)
1
Videos
- Threat Landscape Challenge
1
Readings
- Avast, 2020 Threat Landscape Report
Examples of Cyber Incidence (Week 1, Lecture 6)
1
Videos
- Examples of Cyber Incidence
1
Readings
- James R. Clapper, Worldwide Threat Assessment of the US Intelligence Community (Feb. 2015) – pp. 1-4
Practical Questions (Week 1, Lecture 7)
1
Assignment
- Week 1 Quiz
1
Videos
- Practical Questions
Academic Inspiration and a World Changing Idea (Week 2, Lecture 1)
1
Videos
- Academic Inspiration and a World Changing Idea
1
Readings
- Leiner, Cerf, et. al., A Brief History of the Internet – pp. 1-9
Government Support and Prototyping (Week 2, Lecture 2)
1
Videos
- Government Support and Prototyping
Private Sector Support and Moving the Internet Out of the Lab (Week 2, Lecture 3)
1
Videos
- Private Sector Support and Moving the Internet Out of the Lab
Privatizing and Scaling the Internet (Week 2, Lecture 4)
1
Videos
- Privatizing and Scaling the Internet
Building the World Wide Web (Week 2, Lecture 5)
1
Videos
- Building the World Wide Web
The Internet as a Global Commons (Week 2, Lecture 6)
1
Assignment
- Week 2 Quiz
1
Videos
- The Internet as a Global Commons
How Data Moves: Encapsulation (Week 3, Lecture 1)
1
Videos
- How Data Moves: Encapsulation
1
Readings
- Vangie Beal “The 7 layers of the OSI Model”, Webopedia
How Data Moves: Application Layer (Week 3, Lecture 2)
1
Videos
- How Data Moves: Application Layer
How Data Moves: Network Layer (Week 3, Lecture 3)
1
Videos
- How Data Moves: Network Layer
How Data Moves: Physical Layer (Week 3, Lecture 4)
1
Videos
- How Data Moves: Physical Layer
What is Governance? (Week 3, Lecture 5)
1
Videos
- What is Governance?
1
Readings
- Joseph S. Nye, Jr. “The Regime Complex for Managing Global Cyber Activities”, Global Commission on Internet Governance“ 2014
Governing the Internet (Week 3, Lecture 6)
1
Assignment
- Week 3 Quiz
1
Videos
- Governing the Internet
2
Readings
- Assante & Bochman “IoT, Automation, Autonomy, and Megacities in 2025: A Dark Preview”, Center for Strategic & International Studies, April 2017
- Fischer, “The Internet of Things: Frequently Asked Questions” Congressional Research Service, Oct 2015
Threat Actors: Who Are the Hackers? (Week 4, Lecture 1)
1
Videos
- Threat Actors: Who Are the Hackers?
1
Readings
- Cybersecurity Threats Impacting the Nation
Threat Actors: Hobbyists (Week 4, Lecture 2)
1
Videos
- Threat Actors: Hobbyists
Threat Actors: Criminal Organizations (Week 4, lecture 3)
1
Videos
- Threat Actors: Criminal Organizations
1
Readings
- Fire Eye, “APT28 Cybergroup Activity”
Cyber Crime Case Study: The San Francisco Muni Attack (Week 4, Lecture 4)
1
Videos
- Cyber Crime Case Study: The San Francisco Muni Attack
Threat Actors: Hacktivists (Week 4, Lecture 5)
1
Videos
- Threat Actors: Hacktivists
Threat Actors: Advanced Persistent Threats (Week 4, Lecture 6)
1
Assignment
- Week 4 Quiz
1
Videos
- Threat Actors: Advanced Persistent Threats
1
Readings
- Lillian Ablon, Martin C. Libicki, Andrea A. Golay, Markets for cybercrime tools and stolen data, RAND Corporation
Hacking As a Process (Week 5, Lecture 1)
1
Videos
- Hacking As a Process
1
Readings
- Lockheed Martin Cyber Kill chain
Reconnaissance (Week 5, Lecture 2)
1
Videos
- Reconnaissance
Weaponization (Week 5, Lecture 3)
1
Videos
- Weaponization
1
Readings
- MITRE ATT&CK Framework
Delivery (Week 5, Lecture 4)
1
Videos
- Delivery
Exploitation and Installation (Week 5, Lecture 5)
1
Videos
- Exploitation and Installation
Command and Control (Week 5, Lecture 6)
1
Videos
- Command and Control
1
Readings
- Boebert, W. Earl, “A Survey of Challenges in Attribution,” in National Research Council, Proceedings of a Workshop on Deterring Cyberattacks, 2010, pp. 41-52.
Effects (Week 5, Lecture 7)
1
Assignment
- Week 5 Quiz
1
Videos
- Effects
Framing Effects (Week 6, Lecture 1)
1
Videos
- Framing Effects
1
Readings
- Harry, C & Gallagher, N “ Classifying Cyber Events: A Proposed Taxonomy” , CISSM
Primary Effects (Week 6, Lecture 2)
1
Videos
- Primary Effects
Secondary Effects (Week 6, Lecture 3)
1
Videos
- Secondary Effects
Second Level Effects (Week 6, Lecture 4)
1
Videos
- Second Level Effects
A Strategic Approach to Cybersecurity (Week 6, Lecture 5)
1
Assignment
- Week 6 Quiz
1
Peer Review
- Course Final Project
1
Videos
- A Strategic Approach to Cybersecurity
Auto Summary
"Cybersecurity for Everyone" is a foundational course in IT & Computer Science designed to demystify cybersecurity for all, from novices to seasoned professionals. Led by Dr. Charles Harry, a former NSA expert, this engaging program covers technical foundations, policy considerations, and practical applications in cybersecurity. With a duration of 1320 minutes, it caters to both non-technical individuals and those active in the field, providing essential principles for understanding the evolving security landscape. Available on Coursera with a Starter subscription, it's ideal for anyone looking to enhance their cybersecurity knowledge.

Charles Harry