Cybersecurity and Its Ten Domains

Start Date: 07/05/2020

Course Type: Common Course

Course Link: https://www.coursera.org/learn/cyber-security-domain

About Course

This course is designed to introduce students, working professionals and the community to the exciting field of cybersecurity. Throughout the MOOC, participants will engage in community discourse and online interaction. Participants will gain knowledge and understanding of cybersecurity and its domains. They will engage with expertly produced videos, gain insight from industry experts, participate in knowledge assessments, practice assessing their environmental awareness, and gain access to materials that address governance and risk management, compliance, business continuity and disaster recovery, cryptography, software development security, access control, network security, security architecture, security operations, and physical and environmental security. Learning will be assessed using strategies aligned to knowledge and understanding. You do not need prior experience in IT security to do well in this course. All you need is a willingness to learn. We will point you to relevant open and free resources to assist you. At the end of this course, you will have the option of applying for undergraduate level course credit at Kennesaw State University (dependent on admission to Kennesaw State University as a degree seeking or a non-degree seeking student). More information is available in final module "Receive Course (undergraduate) Credit at Kennesaw State University".

Course Syllabus

In this module we cover some of the fundamentals of security that will assist you throughout the course. We will then introduce you to two domains of cyber security: access control and software development security. Focus will be on areas such as confidentiality, integrity, and availability, as well secure software development techniques.

Coursera Plus banner featuring three learners and university partner logos

Course Introduction

Cybersecurity and Its Ten Domains This course will explore the origins and development of cybersecurity issues, their sources and methods, and the challenges for society when it comes to cybersecurity. We will also examine the evolution of cybersecurity policy and when it became necessary for companies to build cybersecurity systems in order to protect their systems and prevent attacks against them.Building Cybersecurity Origins of Cybersecurity Security Policy for Business with Respect to Cybersecurity Security Policy for Business with Respect to Cybersecurity and Its Domains Critical Thinking for Engineering Leaders In this course, you’ll learn how to use critical thinking to help you make better decisions as you evaluate information and performance. Through this course, you’ll master a set of strategies that allow you to recognize risks and mitigate them, while also helping you make informed decisions. You’ll also master a set of methods that allow you to recognize the importance of contextual information and how to use thinking to evaluate risk. By the end of this course, you’ll be able to recognize two types of decision-making errors, and be able to recognize the types of errors that can derail a project’s chances of success. You’ll also be able to recognize the role of factors such as context, culture, and environment as well as different decision-making styles based on a given set of circumstances. This will allow you to identify problems and issues before they become critical and attribute solutions rather

Course Tag

Cybersecurity Cryptography Information Security (INFOSEC) Cyber-Security Regulation

Related Wiki Topic

Article Example
Fidelis Cybersecurity Fidelis Cybersecurity is a cybersecurity company focused on prevention of advanced threats and data breaches. International Business Machines, the United States Army and the United States Department of Commerce are among its customers.
New Jersey Cybersecurity and Communications Integration Cell The New Jersey Cybersecurity and Communications Integration Cell, or NJCCIC, is an American Information Sharing and Analysis Organization that exchanges cyber threat intelligence and conducts incident response for governments, businesses, and citizens in New Jersey. The NJCCIC's nomenclature is derived from its federal counterpart, the National Cybersecurity and Communications Integration Center, which encompasses the U.S. Department of Homeland Security's Computer Emergency Readiness Team (US-CERT). Its parent agency is the New Jersey Office of Homeland Security and Preparedness.
National Cybersecurity FFRDC The National Cybersecurity FFRDC (NCF) is a federally funded research and development center operated by MITRE Corporation. It supports the U.S. National Institute of Standards and Technology's National Cybersecurity Center of Excellence. NCF is the first and, as of March 2017, only federally funded research and development center dedicated solely to cybersecurity. The National Cybersecurity FFRDC is located at 9700 Great Seneca Hwy in Rockville, Maryland.
Power domains In denotational semantics and domain theory, power domains are domains of nondeterministic and concurrent computations.
National Cybersecurity FFRDC NCF also fosters public-private collaborations to identify and solve cybersecurity threats. Through NIST’s Work for Others Program, non-profits, and federal, state and local agencies can access the cybersecurity technologies and talent at the NCF.
NIST Cybersecurity Framework "Develop the organizational understanding to manage cybersecurity risk to systems, assets, data, and capabilities."
NIST Cybersecurity Framework "Develop and implement the appropriate activities to take action regarding a detected cybersecurity event."
NIST Cybersecurity Framework "Develop and implement the appropriate activities to identify the occurrence of a cybersecurity event."
NIST Cybersecurity Framework The framework is divided into three parts, "Core", "Profile" and "Tiers". The "Framework Core" contains an array of activities, outcomes and references which detail approaches to aspects of cyber security. The "Framework Implementation Tiers" are used by an organization to clarify for itself and its partners how it views cybersecurity risk and the degree of sophistication of its management approach.
Centre for Cybersecurity & Cybercrime Investigation The University College Dublin Centre for Cybersecurity & Cybercrime Investigation (UCD CCI) is a centre for research and education in cybersecurity, cybercrime and digital forensic science in Dublin, Ireland.
NIST Cybersecurity Framework For each category, it defines a number of subcategories of cybersecurity outcomes and security controls, with 98 subcategories in all.
Comprehensive National Cybersecurity Initiative The Comprehensive National Cybersecurity Initiative (CNCI) was established by President George W. Bush in "National Security Presidential Directive 54/Homeland Security Presidential Directive 23 (NSPD-54/HSPD-23)" in January 2008. The initiative outlines U.S. cybersecurity goals and spans multiple agencies including the Department of Homeland Security, the Office of Management and Budget, and the National Security Agency.
Cybersecurity CS5L CMM Questions are created in co-operation with each cybersecurity vendor.
NIST Cybersecurity Framework An organization typically starts by using the framework to develop a "Current Profile", which describes its current cybersecurity activities and what outcomes it is achieving. It can then develop a "Target Profile", or adopt a baseline profile that has been tailored to better match its critical infrastructure sector or type of organization. It can then take steps to close the gaps between its current profile and its target profile.
NIST Cybersecurity Framework "Develop and implement the appropriate activities to maintain plans for resilience and to restore any capabilities or services that were impaired due to a cybersecurity event."
Cybersecurity Information Sharing Act The Cybersecurity Information Sharing Act (CISA [113th Congress], [114th Congress]) is a United States federal law designed to "improve cybersecurity in the United States through enhanced sharing of information about cybersecurity threats, and for other purposes". The law allows the sharing of Internet traffic information between the U.S. government and technology and manufacturing companies. The bill was introduced in the U.S. Senate on July 10, 2014, and passed in the Senate October 27, 2015. Opponents question CISA's value, believing it will move responsibility from private business to the government, thereby increasing vulnerability of personal private information, as well as dispersing personal private information across seven government agencies, including the NSA and local police.
Google Domains Apart from domain registration, the service offers, at no additional cost, private domain registration, DNS hosting, dynamic DNS, domain forwarding and email forwarding to any Gmail address. Google Sites can be automatically configured as a website builder, but Google Domains also offer one-click configuration for Squarespace, Wix.com, Weebly and Shopify. Google also lets connect the domain name to a Blogger blog. , Google Domains offer over 60 top-level domains, mostly so-called new TLDs.
National Cybersecurity and Critical Infrastructure Protection Act of 2013 The National Cybersecurity and Critical Infrastructure Protection Act of 2013 () is a bill that would amend the Homeland Security Act of 2002 to require the Secretary of the Department of Homeland Security (DHS) to conduct cybersecurity activities on behalf of the federal government and would codify the role of DHS in preventing and responding to cybersecurity incidents involving the Information Technology (IT) systems of federal civilian agencies and critical infrastructure in the United States.
Homeland Security Cybersecurity Boots-on-the-Ground Act The Homeland Security Cybersecurity Boots-on-the-Ground Act would require the United States Secretary of Homeland Security to: (1) develop occupation classifications for individuals performing activities in furtherance of the cybersecurity mission of the United States Department of Homeland Security (DHS), (2) ensure that such classifications may be used throughout DHS and are made available to other federal agencies, and (3) assess the readiness and capacity of DHS to meet its cybersecurity mission.
National Cybersecurity Center of Excellence President Barack Obama issued Executive Order 13636, “Improving Critical Infrastructure Cybersecurity,” in February 2013 tasking NIST to create a cybersecurity framework that helps organizations mitigate risks to the nation’s essential systems such as power generation and distribution, the financial services sector, and transportation. NIST released the Framework for Improving Critical Infrastructure Cybersecurity in February 2014, which “consists of standards, guidelines and practices to promote the protection of critical infrastructure.” The NCCoE demonstrates how the framework can be implemented in real-world environments. When an industrial sector approaches the center with a cybersecurity problem, the center maps the solution’s hoped-for capabilities to the Cybersecurity Framework, as well as to other standards, controls and best practices.