[AI] Free online course-Cybersecurity and Its Ten Domains

Kotian, H P hpkotian at rbi.org.in
Tue Jul 7 21:57:00 PDT 2015


Hi
The platform is definitely accessible.
However, quite often in the video lecture info is displayed on the screen and sometime pointed to.   This, is not read aloud.

Apart from this, it is pretty accessible and quite often transcript of the lecture is also available.
Harish

-----Original Message-----
From: AccessIndia [mailto:accessindia-bounces at accessindia.org.in] On Behalf Of Pinkesh Tailor
Sent: 07 July 2015 21:49
To: AccessIndia: a list for discussing accessibility and issues concerning the disabled.
Subject: Re: [AI] Free online course-Cybersecurity and Its Ten Domains

Hi, would their interface for training students on virtual platform be accessible? It makes sense to me to pay for this course and get certified as the cost of the course quite reasonable.


On 7/7/15, Kotian, H P <hpkotian at rbi.org.in> wrote:
>
> Friends
>
>
> I believe, this will be a wonderful course for all of us to take.
> You can take for free, if you choose the second option on the radio
> button for the course without the certificate.
>
>
> This is under coursera. There are many more wonderful courses if one
> has the inclination to learn more and more.
>
> Read on.
> Harish Kotian
>
> Cybersecurity and Its Ten Domains
> Cybersecurity and Its Ten
> Domains<https://eventing.coursera.org/redirect/D21NYSG2sIuLEjwfMccRc8t
> rLnsdInlZ1eqi0JIZZcHK4tvSveiWPk8k7wyg2dz93hYtxUZAXbqPNoFsyd7kGA.ShM_Vm
> gVh2DhmxbMJyLMvw.9uF4lrIs84xPA24XYvbUcVKWWvLJx3retf--KOTqEkk_sSCp22uAC
> JaqQJC6GRvYzYBbO8xpjYUcJr8VifB3YXrSZUUWrYDb6KqHvWcjZREGEkMK_AHrAAO33of
> ry0gn6eMoc1ywLewk420UPaQYwpQa6suWJmUMwGOX7Dsfo2rIZ33AbC2TRD7TATp6Iap3Y
> xBfdLmXepwwHy4DFga1yNUVHy9N2OteAw4ikTRLPATXh3Pb4e5YAHskEJZrpX-lhAGrTtk
> 3bMrtk0Z07U-Bp6Jiluw7CHm8gIVg7T52rkwyVaCsdTqFhuXSknMlZMIqc715UHcFpQjes
> 5IsZO3nDHPKbyIz4pSHKNLhqHZvs786spgOrqcNtf0U6wRsmmiVxn6lqd4-DA3Ux9vymKE
> gz39A_AtdxgSlmhqm79z_j5pg6KrBfOXgsgOyIuzjOLydVXsUIs_0opb8wkRgCEmedyM8A
> xuTXyIiWXKBY5fJHTq3pVd3sw_AJXD9WNuCjXLH0TPmyT6dafnrvBc5YrUAXA>
> About this Course
>
> This course is designed to introduce students, working professionals
> and the community to the exciting field of cybersecurity. Throughout
> the MOOC, participants will engage in community discourse and online
> interaction. Participants will gain knowledge and understanding of
> cybersecurity and its domains. They will engage with expertly produced
> videos, gain insight from industry experts, participate in knowledge
> assessments, practice assessing their environmental awareness, and
> gain access to materials that address governance and risk management,
> compliance, business continuity and disaster recovery, cryptography,
> software development security, access control, network security,
> security architecture, security operations, and physical and environmental security.
> Learning
> will be assessed using strategies aligned to knowledge and understanding.
>
> You do not need prior experience in IT security to do well in this course.
> All you need is a willingness to learn. We will point you to relevant
> open and free resources to assist you.
>
> At the end of this course, you will have the option of applying for
> undergraduate level course credit at Kennesaw State University
> (dependent on admission to Kennesaw State University as a degree
> seeking or a non-degree seeking student). More information is
> available in final module "Receive Course
> (undergraduate)
> Credit at Kennesaw State University".
>
> ¬¬Subtitles available in English
> 6 hours of videos, quizzes and peer review
> 3 min
>
> 1. Welcome and Course Overview
> Checkout our marquee speaker. She's the Chief Privacy Officer at Coca Cola.
> x
>   Show 5 itemsShow items for module Welcome and Course Overview
> 55 min
>
> 2. Introduction to Security, Access Control, and Software Development
> Security In this module we cover some of the fundamentals of security
> that will assist you throughout the course. We will then introduce you
> to two domains of cyber
> security: access control and software development security. Focus will
> be on areas such as confidentiality, integrity, and availability, as
> well secure software development techniques.
> x
>   Show 7 itemsShow items for module Introduction to Security, Access
> Control, and Software Development Security
> 53 min
>
> 3. Business Continuity and Disaster Recovery Planning and Cryptography
> In this module we are going to delve a little deeper into cyber
> security by covering business continuity and disaster recovery
> planning and cryptography.
> Learners will be exposed to what a disruptive event is and how the
> federal government through agencies such as FEMA handles disasters. We
> will also covers encryption and decryption and the various techniques
> used.
> x
>   Show 6 itemsShow items for module Business Continuity and Disaster
> Recovery Planning and Cryptography
> 54 min
>
> 4. Information Security Governance and Risk Management & Legal,
> Regulations, Investigations, and Compliance In this module we are
> going to cover some of the non-technical topics associated to cyber
> security: Information security governance and risk management and
> legal, regulations, investigations, and compliance. It is important to
> realize, that non-technical does not mean easy, or not important. In
> fact, I would like to argue that they are more important that the
> technical side of cyber security.
> x
>   Show 6 itemsShow items for module Information Security Governance
> and Risk Management & Legal, Regulations, Investigations, and
> Compliance
> 50 min
>
> 5. Operations Security & Physical and Environmental Security In this
> module we are going to cover what amount to some of the more intuitive
> parts of cybersecurity: operations security and physical and
> environmental security. Learners will understand operations security
> from a competitor/enemy/hacker’s viewpoint and then develop and apply
> countermeasures accordingly.
> Learners will also be exposed to electric power issues such as
> brownouts, fire detection and suppression, and HVAC.
> x
>   Show 6 itemsShow items for module Operations Security & Physical and
> Environmental Security 1h 52m
>
> 6. Security Architecture and Design & Telecommunications and Network
> Security In this module we are going to cover some of the most
> technical and comprehensive topics that cyber security has to offer as
> we look at Security Architecture and Design and Telecommunications and
> Network Security. Learners will be exposed to security models such as
> Bell LaPadula, Clark-Wilson, Mandatory Access Control (MAC),
> Discretionary Access Control (DAC), Role-Based Access Control (RBAC),
> and Access Matrix. We will also describe the Open Systems Interconnect
> (OSI) model and its seven layers.
> x
>   Show 7 itemsShow items for module Security Architecture and Design &
> Telecommunications and Network Security
>
> 7. Receive Undergraduate Course Credit at Kennesaw State University In
> this module we provide details about leveraging this MOOC for credit
> at the undergraduate level at Kennesaw State University. It is very
> important that learners follow directions carefully.
>
> ________________________________
> Caution: The Reserve Bank of India never sends mails, SMSs or makes
> calls asking for personal information such as your bank account
> details, passwords, etc. It never keeps or offers funds to anyone.
> Please do not respond in any manner to such offers, however official
> or attractive they may look.
>
> Notice: This email and any files transmitted with it are confidential
> and intended solely for the use of the individual or entity to whom
> they are addressed. If you are not the intended recipient, any
> dissemination, use, review, distribution, printing or copying of the
> information contained in this e-mail message and/or attachments to it
> are strictly prohibited. If you have received this email by error,
> please notify us by return e-mail or telephone and immediately and
> permanently delete the message and any attachments. The recipient
> should check this email and any attachments for the presence of
> viruses. The Reserve Bank of India accepts no liability for any damage caused by any virus transmitted by this email.
>
>
> Register at the dedicated AccessIndia list for discussing
> accessibility of mobile phones / Tabs on:
> http://mail.accessindia.org.in/mailman/listinfo/mobile.accessindia_acc
> essindia.org.in
>
>
> Search for old postings at:
> http://www.mail-archive.com/accessindia@accessindia.org.in/
>
> To unsubscribe send a message to
> accessindia-request at accessindia.org.in
> with the subject unsubscribe.
>
> To change your subscription to digest mode or make any other changes,
> please visit the list home page at
> http://accessindia.org.in/mailman/listinfo/accessindia_accessindia.org
> .in
>
>
> Disclaimer:
> 1. Contents of the mails, factual, or otherwise, reflect the thinking
> of the person sending the mail and AI in no way relates itself to its
> veracity;
>
> 2. AI cannot be held liable for any commission/omission based on the
> mails sent through this mailing list..
>



Register at the dedicated AccessIndia list for discussing accessibility of mobile phones / Tabs on:
http://mail.accessindia.org.in/mailman/listinfo/mobile.accessindia_accessindia.org.in


Search for old postings at:
http://www.mail-archive.com/accessindia@accessindia.org.in/

To unsubscribe send a message to
accessindia-request at accessindia.org.in
with the subject unsubscribe.

To change your subscription to digest mode or make any other changes, please visit the list home page at http://accessindia.org.in/mailman/listinfo/accessindia_accessindia.org.in


Disclaimer:
1. Contents of the mails, factual, or otherwise, reflect the thinking of the person sending the mail and AI in no way relates itself to its veracity;

2. AI cannot be held liable for any commission/omission based on the mails sent through this mailing list..

Caution: The Reserve Bank of India never sends mails, SMSs or makes calls asking for personal information such as your bank account details, passwords, etc. It never keeps or offers funds to anyone. Please do not respond in any manner to such offers, however official or attractive they may look.

Notice: This email and any files transmitted with it are confidential and intended solely for the use of the individual or entity to whom they are addressed. If you are not the intended recipient, any dissemination, use, review, distribution, printing or copying of the information contained in this e-mail message and/or attachments to it are strictly prohibited. If you have received this email by error,  please notify us by return e-mail or telephone and immediately and permanently delete the message and any attachments. The recipient should check this email and any attachments for the presence of viruses. The Reserve Bank of India  accepts no liability for any damage caused by any virus transmitted by this email.


More information about the AccessIndia mailing list