This course is for you if you are interested in transitioning toward a managerial role in cybersecurity and mobility. Through interviews with industry experts in this area, you will be able to analyze innovations powering the rapid spread of information technology and how they present new challenges for protecting data. For example, mobile devices increase convenience but often bypass traditional security measures. After this course, you will be able to describe how the nature of the threat evolves, as culprits employ a burgeoning set of sophisticated tools to take advantage of our growing reliance on networks for critical-data exchange.
The University System of Georgia is composed of 28 higher education institutions including 4 research universities, 2 regional universities, 12 state universities, 13 state colleges and the Skidaway Institute of Oceanography. The Georgia Public Library System, encompassing 61 library systems throughout Georgia, is also part of the University System.
- 5 stars63.52%
- 4 stars27.39%
- 3 stars5.88%
- 2 stars1.51%
- 1 star1.68%
来自CYBERSECURITY AND MOBILITY的热门评论
I enjoyed this course. I think having several different learning mediums was helpful. Videos, reading, trends in security. Very informative course.
If anyone wants to know about Basics of Cybersecurity, Mobility and IoT, this is one of the very good course. I will recommend it to others. Thanks To CourseEra and the teachers.
So far I've gone through the first week. Lots of business and technical info. The video quality is AMAZING!!
This is very exceptional information that gives us a lot of knowledge to work with/implement in the area of cybersecurity and mobility.
关于 Cybersecurity: Developing a Program for Your Business 专项课程
Cybersecurity is an essential business skill for the evolving workplace. For-profit companies, government agencies, and not-for-profit organizations all need technologically proficient, business-savvy information technology security professionals. In this Specialization, you will learn about a variety of processes for protecting business assets through policy, education and training, and technology best practices. You’ll develop an awareness of the risks and cyber threats or attacks associated with modern information usage, and explore key technical and managerial topics required for a balanced approach to information protection. Topics will include mobility, the Internet of Things, the human factor, governance and management practices.