This course is for you if you are interested in transitioning toward a managerial role in cybersecurity and mobility. Through interviews with industry experts in this area, you will be able to analyze innovations powering the rapid spread of information technology and how they present new challenges for protecting data. For example, mobile devices increase convenience but often bypass traditional security measures. After this course, you will be able to describe how the nature of the threat evolves, as culprits employ a burgeoning set of sophisticated tools to take advantage of our growing reliance on networks for critical-data exchange.
The University System of Georgia is composed of 28 higher education institutions including 4 research universities, 2 regional universities, 12 state universities, 13 state colleges and the Skidaway Institute of Oceanography. The Georgia Public Library System, encompassing 61 library systems throughout Georgia, is also part of the University System.
- 5 stars63.52%
- 4 stars27.39%
- 3 stars5.88%
- 2 stars1.51%
- 1 star1.68%
来自CYBERSECURITY AND MOBILITY的热门评论
Great Course and Great materials. Very insightful into this very deep subject of Cybersecurity and correlation with other aspects of Technology.
Its is a great course to take, it opens you the window for future knowlege about cybersecurity and mobility.
If anyone wants to know about Basics of Cybersecurity, Mobility and IoT, this is one of the very good course. I will recommend it to others. Thanks To CourseEra and the teachers.
I liked the combination of video and readings, and short quizzes during the video. Very practical while still academic.
关于 Cybersecurity: Developing a Program for Your Business 专项课程
Cybersecurity is an essential business skill for the evolving workplace. For-profit companies, government agencies, and not-for-profit organizations all need technologically proficient, business-savvy information technology security professionals. In this Specialization, you will learn about a variety of processes for protecting business assets through policy, education and training, and technology best practices. You’ll develop an awareness of the risks and cyber threats or attacks associated with modern information usage, and explore key technical and managerial topics required for a balanced approach to information protection. Topics will include mobility, the Internet of Things, the human factor, governance and management practices.