- Level Foundation
- Duration 10 hours
- Course by University of Maryland, College Park
-
Offered by
About
Cybersecurity affects everyone, including in the delivery of basic products and services. If you or your organization want to better understand how to address your cybersecurity, this is the course for you and your colleagues to take -- from seasoned professionals to your non-technical colleagues. Your instructor, Dr. Charles Harry, has served on the front lines with the NSA (National Security Agency) and as an expert advising corporate and institutional leaders on managing cybersecurity risk. And he brings a rare and engaging perspective to help you learn cybersecurity from the ground up. A Strategic Approach to Cybersecurity provides a framework for understanding the interdependency of private and public entities and the complex systems affecting you and your organization, toward improving critical cybersecurity infrastructure impacting your security. While not its prerequisite, it builds on Dr. Harry's first course, Cybersecurity for Everyone, with over 100,000 learners globally and growing, which AI Time Journal called "next-level" and highlighted as the top university cybersecurity offering online this year. The course lays the groundwork to understand and explore the key issues facing leaders and policy makers attempting to manage the problem of cybersecurity, from its technical foundations to the domestic and international policy considerations surrounding governance, privacy, and risk management, to applications for achieving the goals of an enterprise, an institution, or a nation. This course is designed for students with some or no background in information technology, whether a novice or active in the cybersecurity field (engineers and computer scientists will learn the broader context and business aspects of cybersecurity), and will provide the principles to understand the current debates shaping a rapidly evolving security landscape.Modules
Introduction to the Course (Week 1, Foundations, Overview, and Lecture 1)
3
Videos
- Foundations: An Introduction (Please watch if you have not yet taken the first course of this series [optional course, unless you are taking the full specialization]: Cybersecurity for Everyone)
- Overview: A Strategic Approach to Cybersecurity
- Introduction to the Course
What Do We Mean by a Strategic Approach to Cybersecurity? (Week 1, Lecture 2)
1
Videos
- What Do We Mean by a Strategic Approach to Cybersecurity?
Cybersecurity in the Private Sector Context (Week 1, Lecture 3)
1
Videos
- Cybersecurity in the Private Sector Context
Cybersecurity in the Public Sector Context (Week 1, Lecture 4)
1
Assignment
- Week 1 Quiz
1
Videos
- Cybersecurity in the Public Sector Context
1
Readings
- The Challenge of Assessing Strategic Cyber Security Risk in Organizations and Critical Infrastructure
Private Organizations: Complexity, Interdependence, and Layered Defense (Week 2, Lecture 1)
1
Videos
- Private Organizations: Complexity, Interdependence, and Layered Defense
Private Organizations: Framework for Practical Action (Week 2, Lecture 2)
1
Videos
- Private Organizations: Framework for Practical Action
1
Readings
- NIST Framework for Improving Critical Infrastructure Cybersecurity v1.1
NIST Functions: Identify (Week 2, Lecture 3)
1
Videos
- NIST Functions: Identify
NIST Functions: Protect (Week 2, Lecture 4)
1
Assignment
- Week 2 Quiz
1
Videos
- NIST Functions: Protect
NIST Functions: Detect (Week 3, Lecture 1)
1
Videos
- NIST Functions: Detect
NIST Functions: Respond (Week 3, Lecture 2)
1
Videos
- NIST Functions: Respond
NIST Functions: Recover (Week 3, Lecture 3)
1
Videos
- NIST Functions: Recover
Strategic Context and Developing Cyber Maturity (Week 3, Lecture 4)
1
Assignment
- Week 3 Quiz
1
Videos
- Strategic Context and Developing Cyber Maturity
1
Readings
- NIST Framework for Improving Critical Infrastructure Cybersecurity v1.1
How Do Governments See the Cybersecurity Problem? (Week 4, Lecture 1)
1
Videos
- How Do Governments See the Cybersecurity Problem?
1
Readings
- Cyberspace Solarium Commission Report - Executive Summary March 2020
Defining and Categorizing Critical Infrastructure (Week 4, Lecture 2)
1
Videos
- Defining and Categorizing Critical Infrastructure
When and How Does a Government Respond? (Week 4, Lecture 3)
1
Assignment
- Week 4 Quiz
1
Videos
- When and How Does a Government Respond?
2
Readings
- Presidential Policy Directive - Critical Infrastructure Security and Resilience
- Presidential Policy Directive - United States Cyber Incident Coordination
Beyond Critical Sectors: Defining National Critical Functions (Week 5, Lecture 1)
1
Videos
- Beyond Critical Sectors: Defining National Critical Functions
1
Readings
- Status Update on the National Critical Functions
National Critical Functions: Connections (Week 5, Lecture 2)
1
Videos
- National Critical Functions: Connections
National Critical Functions: Distribution (Week 5, Lecture 3)
1
Videos
- National Critical Functions: Distribution
National Critical Functions: Management (Week 5, Lecture 4)
1
Videos
- National Critical Functions: Management
1
Readings
- National Security Memorandum on Improving Cybersecurity for Critical Infrastructure Control Systems
National Critical Functions: Supplies (Week 5, Lecture 5)
1
Assignment
- Week 5 Quiz
1
Videos
- National Critical Functions: Supplies
1
Readings
- Strategic Cyber Effects in Complex Systems: Understanding the US Air Transportation Sector
What Do We Mean by Strategic Consequence? (Week 6, Lecture 1)
1
Videos
- What Do We Mean by Strategic Consequence?
From Device to National Critical Function (Week 6, Lecture 2)
1
Assignment
- Week 6 Quiz
1
Videos
- From Device to National Critical Function
2
Readings
- TSA Rail Cybersecurity Mitigation Actions and Testing
- NIST SP800-39, Managing Information Security Risk Organization, Mission, and Information System View
Final Thoughts: Interdependency
1
Videos
- Final Thoughts: Interdependency
Auto Summary
"A Strategic Approach to Cybersecurity" is an essential course for anyone looking to understand and manage cybersecurity risks. Taught by Dr. Charles Harry, a former NSA expert, this foundational course covers the interdependency of private and public entities, critical infrastructure, and policy considerations. Suitable for novices and professionals alike, it spans 600 minutes and is available on Coursera with a starter subscription. Perfect for those in IT, computer science, or any field impacted by cybersecurity.

Charles Harry