[AI] Free online course-Cybersecurity and Its Ten Domains

Pinkesh Tailor pinkesh.tailor at gmail.com
Tue Jul 7 09:19:28 PDT 2015


Hi, would their interface for training students on virtual platform be
accessible? It makes sense to me to pay for this course and get
certified as the cost of the course quite reasonable.


On 7/7/15, Kotian, H P <hpkotian at rbi.org.in> wrote:
>
> Friends
>
>
> I believe, this will be a wonderful course for all of us to take.
> You can take for free, if you choose the second option on the radio button
> for the course without the certificate.
>
>
> This is under coursera. There are many more wonderful courses if one has the
> inclination to learn more and more.
>
> Read on.
> Harish Kotian
>
> Cybersecurity and Its Ten Domains
> Cybersecurity and Its Ten
> Domains<https://eventing.coursera.org/redirect/D21NYSG2sIuLEjwfMccRc8trLnsdInlZ1eqi0JIZZcHK4tvSveiWPk8k7wyg2dz93hYtxUZAXbqPNoFsyd7kGA.ShM_VmgVh2DhmxbMJyLMvw.9uF4lrIs84xPA24XYvbUcVKWWvLJx3retf--KOTqEkk_sSCp22uACJaqQJC6GRvYzYBbO8xpjYUcJr8VifB3YXrSZUUWrYDb6KqHvWcjZREGEkMK_AHrAAO33ofry0gn6eMoc1ywLewk420UPaQYwpQa6suWJmUMwGOX7Dsfo2rIZ33AbC2TRD7TATp6Iap3YxBfdLmXepwwHy4DFga1yNUVHy9N2OteAw4ikTRLPATXh3Pb4e5YAHskEJZrpX-lhAGrTtk3bMrtk0Z07U-Bp6Jiluw7CHm8gIVg7T52rkwyVaCsdTqFhuXSknMlZMIqc715UHcFpQjes5IsZO3nDHPKbyIz4pSHKNLhqHZvs786spgOrqcNtf0U6wRsmmiVxn6lqd4-DA3Ux9vymKEgz39A_AtdxgSlmhqm79z_j5pg6KrBfOXgsgOyIuzjOLydVXsUIs_0opb8wkRgCEmedyM8AxuTXyIiWXKBY5fJHTq3pVd3sw_AJXD9WNuCjXLH0TPmyT6dafnrvBc5YrUAXA>
> About this Course
>
> This course is designed to introduce students, working professionals and the
> community to the exciting field of cybersecurity. Throughout the MOOC,
> participants
> will engage in community discourse and online interaction. Participants will
> gain knowledge and understanding of cybersecurity and its domains. They
> will
> engage with expertly produced videos, gain insight from industry experts,
> participate in knowledge assessments, practice assessing their
> environmental
> awareness, and gain access to materials that address governance and risk
> management, compliance, business continuity and disaster recovery,
> cryptography,
> software development security, access control, network security, security
> architecture, security operations, and physical and environmental security.
> Learning
> will be assessed using strategies aligned to knowledge and understanding.
>
> You do not need prior experience in IT security to do well in this course.
> All you need is a willingness to learn. We will point you to relevant open
> and
> free resources to assist you.
>
> At the end of this course, you will have the option of applying for
> undergraduate level course credit at Kennesaw State University (dependent on
> admission
> to Kennesaw State University as a degree seeking or a non-degree seeking
> student). More information is available in final module "Receive Course
> (undergraduate)
> Credit at Kennesaw State University".
>
> Subtitles available in English
> 6 hours of videos, quizzes and peer review
> 3 min
>
> 1. Welcome and Course Overview
> Checkout our marquee speaker. She's the Chief Privacy Officer at Coca Cola.
>>   Show 5 itemsShow items for module Welcome and Course Overview
> 55 min
>
> 2. Introduction to Security, Access Control, and Software Development
> Security
> In this module we cover some of the fundamentals of security that will
> assist you throughout the course. We will then introduce you to two domains
> of cyber
> security: access control and software development security. Focus will be on
> areas such as confidentiality, integrity, and availability, as well secure
> software development techniques.
>>   Show 7 itemsShow items for module Introduction to Security, Access
> Control, and Software Development Security
> 53 min
>
> 3. Business Continuity and Disaster Recovery Planning and Cryptography
> In this module we are going to delve a little deeper into cyber security by
> covering business continuity and disaster recovery planning and
> cryptography.
> Learners will be exposed to what a disruptive event is and how the federal
> government through agencies such as FEMA handles disasters. We will also
> covers
> encryption and decryption and the various techniques used.
>>   Show 6 itemsShow items for module Business Continuity and Disaster
> Recovery Planning and Cryptography
> 54 min
>
> 4. Information Security Governance and Risk Management & Legal, Regulations,
> Investigations, and Compliance
> In this module we are going to cover some of the non-technical topics
> associated to cyber security: Information security governance and risk
> management
> and legal, regulations, investigations, and compliance. It is important to
> realize, that non-technical does not mean easy, or not important. In fact,
> I
> would like to argue that they are more important that the technical side of
> cyber security.
>>   Show 6 itemsShow items for module Information Security Governance and Risk
> Management & Legal, Regulations, Investigations, and Compliance
> 50 min
>
> 5. Operations Security & Physical and Environmental Security
> In this module we are going to cover what amount to some of the more
> intuitive parts of cybersecurity: operations security and physical and
> environmental
> security. Learners will understand operations security from a
> competitor/enemy/hacker’s viewpoint and then develop and apply
> countermeasures accordingly.
> Learners will also be exposed to electric power issues such as brownouts,
> fire detection and suppression, and HVAC.
>>   Show 6 itemsShow items for module Operations Security & Physical and
> Environmental Security
> 1h 52m
>
> 6. Security Architecture and Design & Telecommunications and Network
> Security
> In this module we are going to cover some of the most technical and
> comprehensive topics that cyber security has to offer as we look at Security
> Architecture
> and Design and Telecommunications and Network Security. Learners will be
> exposed to security models such as Bell LaPadula, Clark-Wilson, Mandatory
> Access
> Control (MAC), Discretionary Access Control (DAC), Role-Based Access Control
> (RBAC), and Access Matrix. We will also describe the Open Systems
> Interconnect
> (OSI) model and its seven layers.
>>   Show 7 itemsShow items for module Security Architecture and Design &
> Telecommunications and Network Security
>
> 7. Receive Undergraduate Course Credit at Kennesaw State University
> In this module we provide details about leveraging this MOOC for credit at
> the undergraduate level at Kennesaw State University. It is very important
> that
> learners follow directions carefully.
>
> ________________________________
> Caution: The Reserve Bank of India never sends mails, SMSs or makes calls
> asking for personal information such as your bank account details,
> passwords, etc. It never keeps or offers funds to anyone. Please do not
> respond in any manner to such offers, however official or attractive they
> may look.
>
> Notice: This email and any files transmitted with it are confidential and
> intended solely for the use of the individual or entity to whom they are
> addressed. If you are not the intended recipient, any dissemination, use,
> review, distribution, printing or copying of the information contained in
> this e-mail message and/or attachments to it are strictly prohibited. If you
> have received this email by error, please notify us by return e-mail or
> telephone and immediately and permanently delete the message and any
> attachments. The recipient should check this email and any attachments for
> the presence of viruses. The Reserve Bank of India accepts no liability for
> any damage caused by any virus transmitted by this email.
>
>
> Register at the dedicated AccessIndia list for discussing accessibility of
> mobile phones / Tabs on:
> http://mail.accessindia.org.in/mailman/listinfo/mobile.accessindia_accessindia.org.in
>
>
> Search for old postings at:
> http://www.mail-archive.com/accessindia@accessindia.org.in/
>
> To unsubscribe send a message to
> accessindia-request at accessindia.org.in
> with the subject unsubscribe.
>
> To change your subscription to digest mode or make any other changes, please
> visit the list home page at
> http://accessindia.org.in/mailman/listinfo/accessindia_accessindia.org.in
>
>
> Disclaimer:
> 1. Contents of the mails, factual, or otherwise, reflect the thinking of the
> person sending the mail and AI in no way relates itself to its veracity;
>
> 2. AI cannot be held liable for any commission/omission based on the mails
> sent through this mailing list..
>



More information about the AccessIndia mailing list