[AI] Free online course-Cybersecurity and Its Ten Domains

Shushant Bendre dj.shush73 at gmail.com
Fri Jul 10 00:35:32 PDT 2015


how to regester to this corse?
cen you tell me step  for it .

On 7/8/15, Kotian, H P <hpkotian at rbi.org.in> wrote:
> Hi
> The platform is definitely accessible.
> However, quite often in the video lecture info is displayed on the screen
> and sometime pointed to.   This, is not read aloud.
>
> Apart from this, it is pretty accessible and quite often transcript of the
> lecture is also available.
> Harish
>
> -----Original Message-----
> From: AccessIndia [mailto:accessindia-bounces at accessindia.org.in] On Behalf
> Of Pinkesh Tailor
> Sent: 07 July 2015 21:49
> To: AccessIndia: a list for discussing accessibility and issues concerning
> the disabled.
> Subject: Re: [AI] Free online course-Cybersecurity and Its Ten Domains
>
> Hi, would their interface for training students on virtual platform be
> accessible? It makes sense to me to pay for this course and get certified as
> the cost of the course quite reasonable.
>
>
> On 7/7/15, Kotian, H P <hpkotian at rbi.org.in> wrote:
>>
>> Friends
>>
>>
>> I believe, this will be a wonderful course for all of us to take.
>> You can take for free, if you choose the second option on the radio
>> button for the course without the certificate.
>>
>>
>> This is under coursera. There are many more wonderful courses if one
>> has the inclination to learn more and more.
>>
>> Read on.
>> Harish Kotian
>>
>> Cybersecurity and Its Ten Domains
>> Cybersecurity and Its Ten
>> Domains<https://eventing.coursera.org/redirect/D21NYSG2sIuLEjwfMccRc8t
>> rLnsdInlZ1eqi0JIZZcHK4tvSveiWPk8k7wyg2dz93hYtxUZAXbqPNoFsyd7kGA.ShM_Vm
>> gVh2DhmxbMJyLMvw.9uF4lrIs84xPA24XYvbUcVKWWvLJx3retf--KOTqEkk_sSCp22uAC
>> JaqQJC6GRvYzYBbO8xpjYUcJr8VifB3YXrSZUUWrYDb6KqHvWcjZREGEkMK_AHrAAO33of
>> ry0gn6eMoc1ywLewk420UPaQYwpQa6suWJmUMwGOX7Dsfo2rIZ33AbC2TRD7TATp6Iap3Y
>> xBfdLmXepwwHy4DFga1yNUVHy9N2OteAw4ikTRLPATXh3Pb4e5YAHskEJZrpX-lhAGrTtk
>> 3bMrtk0Z07U-Bp6Jiluw7CHm8gIVg7T52rkwyVaCsdTqFhuXSknMlZMIqc715UHcFpQjes
>> 5IsZO3nDHPKbyIz4pSHKNLhqHZvs786spgOrqcNtf0U6wRsmmiVxn6lqd4-DA3Ux9vymKE
>> gz39A_AtdxgSlmhqm79z_j5pg6KrBfOXgsgOyIuzjOLydVXsUIs_0opb8wkRgCEmedyM8A
>> xuTXyIiWXKBY5fJHTq3pVd3sw_AJXD9WNuCjXLH0TPmyT6dafnrvBc5YrUAXA>
>> About this Course
>>
>> This course is designed to introduce students, working professionals
>> and the community to the exciting field of cybersecurity. Throughout
>> the MOOC, participants will engage in community discourse and online
>> interaction. Participants will gain knowledge and understanding of
>> cybersecurity and its domains. They will engage with expertly produced
>> videos, gain insight from industry experts, participate in knowledge
>> assessments, practice assessing their environmental awareness, and
>> gain access to materials that address governance and risk management,
>> compliance, business continuity and disaster recovery, cryptography,
>> software development security, access control, network security,
>> security architecture, security operations, and physical and environmental
>> security.
>> Learning
>> will be assessed using strategies aligned to knowledge and understanding.
>>
>> You do not need prior experience in IT security to do well in this
>> course.
>> All you need is a willingness to learn. We will point you to relevant
>> open and free resources to assist you.
>>
>> At the end of this course, you will have the option of applying for
>> undergraduate level course credit at Kennesaw State University
>> (dependent on admission to Kennesaw State University as a degree
>> seeking or a non-degree seeking student). More information is
>> available in final module "Receive Course
>> (undergraduate)
>> Credit at Kennesaw State University".
>>
>> ¬¬Subtitles available in English
>> 6 hours of videos, quizzes and peer review
>> 3 min
>>
>> 1. Welcome and Course Overview
>> Checkout our marquee speaker. She's the Chief Privacy Officer at Coca
>> Cola.
>> x
>>   Show 5 itemsShow items for module Welcome and Course Overview
>> 55 min
>>
>> 2. Introduction to Security, Access Control, and Software Development
>> Security In this module we cover some of the fundamentals of security
>> that will assist you throughout the course. We will then introduce you
>> to two domains of cyber
>> security: access control and software development security. Focus will
>> be on areas such as confidentiality, integrity, and availability, as
>> well secure software development techniques.
>> x
>>   Show 7 itemsShow items for module Introduction to Security, Access
>> Control, and Software Development Security
>> 53 min
>>
>> 3. Business Continuity and Disaster Recovery Planning and Cryptography
>> In this module we are going to delve a little deeper into cyber
>> security by covering business continuity and disaster recovery
>> planning and cryptography.
>> Learners will be exposed to what a disruptive event is and how the
>> federal government through agencies such as FEMA handles disasters. We
>> will also covers encryption and decryption and the various techniques
>> used.
>> x
>>   Show 6 itemsShow items for module Business Continuity and Disaster
>> Recovery Planning and Cryptography
>> 54 min
>>
>> 4. Information Security Governance and Risk Management & Legal,
>> Regulations, Investigations, and Compliance In this module we are
>> going to cover some of the non-technical topics associated to cyber
>> security: Information security governance and risk management and
>> legal, regulations, investigations, and compliance. It is important to
>> realize, that non-technical does not mean easy, or not important. In
>> fact, I would like to argue that they are more important that the
>> technical side of cyber security.
>> x
>>   Show 6 itemsShow items for module Information Security Governance
>> and Risk Management & Legal, Regulations, Investigations, and
>> Compliance
>> 50 min
>>
>> 5. Operations Security & Physical and Environmental Security In this
>> module we are going to cover what amount to some of the more intuitive
>> parts of cybersecurity: operations security and physical and
>> environmental security. Learners will understand operations security
>> from a competitor/enemy/hacker’s viewpoint and then develop and apply
>> countermeasures accordingly.
>> Learners will also be exposed to electric power issues such as
>> brownouts, fire detection and suppression, and HVAC.
>> x
>>   Show 6 itemsShow items for module Operations Security & Physical and
>> Environmental Security 1h 52m
>>
>> 6. Security Architecture and Design & Telecommunications and Network
>> Security In this module we are going to cover some of the most
>> technical and comprehensive topics that cyber security has to offer as
>> we look at Security Architecture and Design and Telecommunications and
>> Network Security. Learners will be exposed to security models such as
>> Bell LaPadula, Clark-Wilson, Mandatory Access Control (MAC),
>> Discretionary Access Control (DAC), Role-Based Access Control (RBAC),
>> and Access Matrix. We will also describe the Open Systems Interconnect
>> (OSI) model and its seven layers.
>> x
>>   Show 7 itemsShow items for module Security Architecture and Design &
>> Telecommunications and Network Security
>>
>> 7. Receive Undergraduate Course Credit at Kennesaw State University In
>> this module we provide details about leveraging this MOOC for credit
>> at the undergraduate level at Kennesaw State University. It is very
>> important that learners follow directions carefully.
>>
>> ________________________________
>> Caution: The Reserve Bank of India never sends mails, SMSs or makes
>> calls asking for personal information such as your bank account
>> details, passwords, etc. It never keeps or offers funds to anyone.
>> Please do not respond in any manner to such offers, however official
>> or attractive they may look.
>>
>> Notice: This email and any files transmitted with it are confidential
>> and intended solely for the use of the individual or entity to whom
>> they are addressed. If you are not the intended recipient, any
>> dissemination, use, review, distribution, printing or copying of the
>> information contained in this e-mail message and/or attachments to it
>> are strictly prohibited. If you have received this email by error,
>> please notify us by return e-mail or telephone and immediately and
>> permanently delete the message and any attachments. The recipient
>> should check this email and any attachments for the presence of
>> viruses. The Reserve Bank of India accepts no liability for any damage
>> caused by any virus transmitted by this email.
>>
>>
>> Register at the dedicated AccessIndia list for discussing
>> accessibility of mobile phones / Tabs on:
>> http://mail.accessindia.org.in/mailman/listinfo/mobile.accessindia_acc
>> essindia.org.in
>>
>>
>> Search for old postings at:
>> http://www.mail-archive.com/accessindia@accessindia.org.in/
>>
>> To unsubscribe send a message to
>> accessindia-request at accessindia.org.in
>> with the subject unsubscribe.
>>
>> To change your subscription to digest mode or make any other changes,
>> please visit the list home page at
>> http://accessindia.org.in/mailman/listinfo/accessindia_accessindia.org
>> .in
>>
>>
>> Disclaimer:
>> 1. Contents of the mails, factual, or otherwise, reflect the thinking
>> of the person sending the mail and AI in no way relates itself to its
>> veracity;
>>
>> 2. AI cannot be held liable for any commission/omission based on the
>> mails sent through this mailing list..
>>
>
>
>
> Register at the dedicated AccessIndia list for discussing accessibility of
> mobile phones / Tabs on:
> http://mail.accessindia.org.in/mailman/listinfo/mobile.accessindia_accessindia.org.in
>
>
> Search for old postings at:
> http://www.mail-archive.com/accessindia@accessindia.org.in/
>
> To unsubscribe send a message to
> accessindia-request at accessindia.org.in
> with the subject unsubscribe.
>
> To change your subscription to digest mode or make any other changes, please
> visit the list home page at
> http://accessindia.org.in/mailman/listinfo/accessindia_accessindia.org.in
>
>
> Disclaimer:
> 1. Contents of the mails, factual, or otherwise, reflect the thinking of the
> person sending the mail and AI in no way relates itself to its veracity;
>
> 2. AI cannot be held liable for any commission/omission based on the mails
> sent through this mailing list..
>
> Caution: The Reserve Bank of India never sends mails, SMSs or makes calls
> asking for personal information such as your bank account details,
> passwords, etc. It never keeps or offers funds to anyone. Please do not
> respond in any manner to such offers, however official or attractive they
> may look.
>
> Notice: This email and any files transmitted with it are confidential and
> intended solely for the use of the individual or entity to whom they are
> addressed. If you are not the intended recipient, any dissemination, use,
> review, distribution, printing or copying of the information contained in
> this e-mail message and/or attachments to it are strictly prohibited. If you
> have received this email by error,  please notify us by return e-mail or
> telephone and immediately and permanently delete the message and any
> attachments. The recipient should check this email and any attachments for
> the presence of viruses. The Reserve Bank of India  accepts no liability for
> any damage caused by any virus transmitted by this email.
>
>
> Register at the dedicated AccessIndia list for discussing accessibility of
> mobile phones / Tabs on:
> http://mail.accessindia.org.in/mailman/listinfo/mobile.accessindia_accessindia.org.in
>
>
> Search for old postings at:
> http://www.mail-archive.com/accessindia@accessindia.org.in/
>
> To unsubscribe send a message to
> accessindia-request at accessindia.org.in
> with the subject unsubscribe.
>
> To change your subscription to digest mode or make any other changes, please
> visit the list home page at
> http://accessindia.org.in/mailman/listinfo/accessindia_accessindia.org.in
>
>
> Disclaimer:
> 1. Contents of the mails, factual, or otherwise, reflect the thinking of the
> person sending the mail and AI in no way relates itself to its veracity;
>
> 2. AI cannot be held liable for any commission/omission based on the mails
> sent through this mailing list..
>



More information about the AccessIndia mailing list