- Level Foundation
- Duration 9 hours
- Course by Kennesaw State University
-
Offered by
About
In order to manage the cybersecurity function business, you must first understand its language and its environment. This course covers the foundations of cybersecurity, including threats and vulnerabilities as well as the tools, technologies, and strategies used to manage it. After completing this course, a learner will be able to: Define key concepts and terminology in Cybersecurity Identify threats to cybersecurity Identify strategies to identify and remediate vulnerabilities in information assets Identify the systemic components (including personnel) necessary for an effective cybersecurity programModules
Welcome for the Foundations of Cybersecurity
1
Videos
- Welcome
Defining Cybersecurity (Introduction)
1
Videos
- The Definition of Cybersecurity
2
Readings
- The CIA Triad
- Get help and meet other learners. Join your Community!
The Definition of Cybersecurity (Lesson 1.1)
1
Assignment
- The Definition of Cybersecurity (Quiz 1.1.1)
1
Videos
- The Definition of Cybersecurity (Lecture 1.1.1)
Key Terms in Cybersecurity - Part 1 (Lesson 1.2)
1
Assignment
- Key Concepts in Cybersecurity - Part 1 (Quiz 1.1.2)
1
Videos
- Key Concepts in Cybersecurity - Part 1 (Lecture 1.1.2)
Key Terms in Cybersecurity - Part 2 (Lesson 1.3)
1
Assignment
- Key Concepts in Cybersecurity - Part 2 (Quiz 1.1.3)
1
Videos
- Key Concepts in Cybersecurity - Part 2 (Lecture 1.1.3)
Wrap-up for Introduction to Cybersecurity
1
Assignment
- Quiz for Introduction to Cybersecurity Module
1
Videos
- Wrap-up for Introduction to Cybersecurity
Welcome for Threats to Cybersecurity
1
Videos
- Threats to Cybersecurity
1
Readings
- Threats to Cybersecurity
Compromises to IP, Deviations in QoS, & Espionage or Trespass (Lesson 1.2.1)
1
Assignment
- Compromises to IP, Deviations in QoS, & Espionage or Trespass (Quiz 1.2.1)
1
Videos
- Compromises to IP, Deviations in QoS, & Espionage or Trespass (Lecture 1.2.1)
Forces of Nature, Human Error or Failure & Information Extortion (Lesson 1.2.2)
1
Assignment
- Forces of Nature, Human Error or Failure & Information Extortion (Quiz 1.2.2)
1
Videos
- Forces of Nature, Human Error or Failure & Information Extortion (Lecture 1.2.2)
Sabotage or Vandalism, Software Attacks & Technical Hardware Failures (Lesson 1.2.3)
1
Assignment
- Sabotage or vandalism, Software attacks & Technical hardware failures (Quiz 1.2.3)
1
Videos
- Sabotage or Vandalism, Software Attacks & Technical Hardware Failures (Lesson 1.2.3)
Technical Hardware Failure, Technical Software Failure, Technological Obsolescence, and Theft (Lesson 1.2.4)
1
Assignment
- Technical Hardware Failure, Technical Software Failure, Technological Obsolescence, and Theft (Quiz1.2.4)
1
Videos
- Technical Hardware Failure, Technical Software Failure, Technological Obsolescence, and Theft (Lesson 1.2.4)
Wrap-up for Threats to Cybersecurity
1
Assignment
- Threats to Cybersecurity - Module Quiz
1
Videos
- Threats to Cybersecurity Wrap-up
Welcome for Security Technologies
1
Videos
- Security Technologies
1
Readings
- Protection Mechanisms
Access Controls (Lesson 1.3.1)
1
Assignment
- Access Control (Quiz 1.3.1)
1
Videos
- Access Control (Lecture 1.3.1)
Firewalls (Lesson 1.3.2)
1
Assignment
- Firewalls (Quiz 1.3.2)
1
Videos
- Firewalls (Lecture 1.3.2)
Intrusion Detection and Prevention Systems (Lesson 1.3.3)
1
Assignment
- Intrusion Detection and Prevention Systems (Quiz 1.3.3)
1
Videos
- Intrusion Detection andPrevention Systems (Lecture 1.3.3)
Virtual Private Networks (Lesson 1.3.4)
1
Assignment
- Virtual Private Networks (Quiz 1.3.4)
1
Videos
- Virtual Private Networks (Lecture 1.3.4)
Wrap-up for Security Technologies Module
1
Assignment
- Security Technologies Module
1
Videos
- Wrap-up for Security Technologies
Welcome
1
Videos
- Vulnerabilities in Information Assets
1
Readings
- Scanning and Analysis Tools
Understanding Vulnerabilities and Vulnerability Assessment (Lesson 1.4.1)
1
Assignment
- Understanding Vulnerabilities and Vulnerability Assessment (Quiz 1.4.1)
1
Videos
- Understanding Vulnerabilities and Vulnerability Assessment (Lesson 1.4.1)
Vulnerability Assessment: Tools and Techniques (Lesson 1.4.2)
1
Assignment
- Vulnerability Assessment: Tools and Techniques (Quiz 1.4.2)
1
Videos
- Vulnerability Assessment: Tools and Techniques (Lesson 1.4.2)
Vulnerability Remediation Strategies (Lesson 1.4.3)
1
Assignment
- Vulnerability Remediation Strategies (Quiz 1.4.3)
1
Videos
- Vulnerability Remediation Strategies (Lesson 1.4.3)
Configuration and Change Management in Vulnerability Assessment (Lesson 1.4.4)
1
Assignment
- Configuration and Change Management in Vulnerability Assessment (Quiz 1.4.4)
1
Videos
- Configuration and Change Management in Vulnerability Assessment (Lesson 1.4.4)
Wrap-up for Vulnerabilities in Information Assets Module
1
Assignment
- for module Managing Vulnerabilities in Information Assets
1
Videos
- Wrap-up for Managing Vulnerabilities
Welcome
1
Videos
- Understanding the Cybersecurity Program
1
Readings
- Policies, Standards, and Practices
Cybersecurity Personnel and the Security Department (Lesson 1.5.1)
1
Assignment
- The Cybersecurity Personnel and the Security Department (Quiz 1.5.1)
1
Videos
- The Cybersecurity Personnel and the Security Department (Lecture 1.5.1)
Policies, Guidelines and Standards (Lesson 1.5.2)
1
Assignment
- Cybersecurity Programs: Policies, Guidelines and Standards (Quiz 1.5.2)
1
Videos
- Cybersecurity Programs: Policies, Guidelines and Standards (Lesson 1.5.2)
Continuous Improvement Programs (Lesson 1.5.3)
1
Assignment
- Cybersecurity Programs: Continuous Improvement Programs (Quiz 1.5.3)
1
Videos
- Cybersecurity Programs: Continuous Improvement Programs (Lesson 1.5.3)
Wrap up of The Cybersecurity Program
1
Assignment
- for module The Cybersecurity Program
1
Videos
- The Cybersecurity Program, Explained
Wrap-up for The Foundations of Cybersecurity
1
Assignment
- Completion Exam for Course The Foundations of Cybersecurity
1
Videos
- The Foundations of Cybersecurity
Auto Summary
Unlock the essentials of cybersecurity with "The Foundations of Cybersecurity" course, designed for those venturing into the IT and Computer Science fields. This foundational course, created by Coursera, demystifies the complexities of cybersecurity, focusing on key concepts, common threats, and effective strategies for managing vulnerabilities. Guided by industry experts, you'll explore the critical tools and technologies that form the backbone of robust cybersecurity frameworks. By the end of the 540-minute journey, you'll be equipped to define essential cybersecurity terminology, identify potential threats, and implement strategies to safeguard information assets. Additionally, you'll gain insights into the necessary systemic components, including personnel, for a successful cybersecurity program. Flexible subscription options—Starter, Professional, and Paid—ensure you can tailor your learning experience to fit your needs. Perfect for beginners, this course lays the groundwork for a deeper understanding and further exploration in the cybersecurity domain. Join now and take the first step towards mastering the language and environment of cybersecurity.

Herbert J. Mattord, Ph.D., CISM, CISSP, CDP

Michael Whitman, Ph.D., CISM, CISSP