Coursera
目录
  • 浏览
  • 搜索
  • 企业版
  • 登录
  • 注册

Cybersecurity Policy for Water and Electricity Infrastructures

总览授课大纲常见问题解答制作方价格评分和审阅

主页社会科学政府与社会

Cybersecurity Policy for Water and Electricity Infrastructures

University of Colorado System

关于此课程: This course will examine the drinking water and electricity infrastructures, and various policies that have been developed to help guide and strengthen their cybersecurity programs. The drinking water and electricity infrastructures are two of fourteen subsectors comprising what are known as "lifeline infrastructure". The 2013 National Infrastructure Protection Plan identifies four lifeline infrastructure sectors: 1) water, 2) energy, 3) transportation, and 4) communications. These sectors are designated "lifeline" because many other infrastructures depend upon them. The drinking water subsector is part of the water sector, and the electricity subsector is part of the energy sector. Both subsectors are overseen by the Department of Homeland Security National Protection and Programs Directorate which manages the DHS National Infrastructure Protection Program. The NIPP employs a five-step continuous improvement program called the Risk Management Framework. NIPP implementation is overseen by DHS-designated Sector-Specific Agencies staffed by various Federal departments. The Sector-Specific Agencies work in voluntary cooperation with industry representatives to apply the Risk Management Framework and document results in corresponding Sector-Specific Plans. The program began in 2007 and the most recent Sector-Specific Plans were published in 2016. In February 2013, President Obama issued Executive 13636 directing the National Institute of Standards and Technology to develop a voluntary set of recommendations for strengthening infrastructure cybersecurity measures. EO13636 also asked Federal agencies with regulating authority to make a recommendation whether the NIST Cybersecurity Framework should be made mandatory. The Environmental Protection Agency who is both the SSA and regulatory authority for the drinking water subsector recommended voluntary application of the NIST Cybersecurity Framework. The Department of Energy who is both the SSA and regulatory authority for the electricity subsector replied that it was already implementing the Electricity Subsector Cybersecurity Capability Maturity Model, which indeed was what the NIST Cybersecurity Framework was based on. The Department of Energy, though, recommended voluntary application of the ES-C2M2. This module will examine both the drinking water and electricity lifeline infrastructure subsectors, and elements and application of the NIST Cybersecurity Framework and ES-C2M2.

此课程适用人群: This course was designed for learners who currently work in the cybersecurity career field, are interested in working in the cybersecurity career field, or are just curious about the topic. While there are no specific prerequisites for this course, it does assume some common understanding about computers and the Internet. Similarly, while this is mostly a non-technical course, it does require analytical and problem-solving skills on the part of the learner. This course provides a general overview of cybersecurity as it relates to critical infrastructure protection and homeland security. In addition to examining various cybersecurity policies as they apply to the water, electricity, aviation, and Internet infrastructures, this course relates those practices to the broader mission of critical infrastructure protection identifying "who's who and what do they do". This course seeks to demonstrate the intimate relationship between homeland security and cybersecurity. If you are ready to pry open that Pandora's box, then this course is for you. I look forward to seeing you in the lectures. Cheers!


制作方:  University of Colorado System
University of Colorado System

  • Richard White

    教学方:  Richard White, Assistant Research Professor

    Computer Science
基本信息
课程 2(共 4 门,Homeland Security and Cybersecurity Specialization )
级别Beginner
承诺学习时间This is Course 2 in a 4-course specialization. Estimated workload: 15-hours over 1-week.
语言
English
如何通过通过所有计分作业以完成课程。
用户评分
4.7 星
平均用户评分 4.7查看学生的留言
授课大纲
第 1 周
Module 5: Water Infrastructure & NIST Cybersecurity Framework
In this module we will examine the drinking water subsector and the NIST Cybersecurity Framework for strengthening this infrastructure's cybersecurity practices.
3 视频, 3 阅读材料, 2 练习测试
  1. 视频: Course 2 Introduction
  2. 视频: L11 Water Infrastructure
  3. Reading: Water: International Perspective (Optional Video)
  4. Practice Quiz: L11 Challenge Questions
  5. 视频: L12 NIST Cybersecurity Framework
  6. Reading: NIST Cybersecurity Framework (Optional)
  7. Reading: More on NIST CSF (Optional Video)
  8. Practice Quiz: L12 Challenge Questions
  9. Discussion Prompt: What do you think?
第 2 周
Module 6: Applied NIST Cybersecurity Framework
In this module we will take a closer look at the NIST Cybersecurity Framework and apply its tenets to different hypothetical situations. Also included in this module is course exam #3. Good luck!
3 视频, 3 练习测试
  1. 视频: L13 Applying NIST CSF (1)
  2. Practice Quiz: L13 Challenge Questions
  3. 视频: L14 Applying NIST CSF (2)
  4. Practice Quiz: L14 Challenge Questions
  5. 视频: L15 Applying NIST CSF (3)
  6. Practice Quiz: L15 Challenge Questions
  7. Discussion Prompt: What do you think?
已评分: Exam 3
第 3 周
Module 7: Electricity Infrastructure & ES-C2M2
In this module we will examine the North American electric grid and the Electricity Subsector Cyber Capability Maturity Model for strengthening this infrastructure's cybersecurity practices.
2 视频, 3 阅读材料, 2 练习测试
  1. 视频: L16 Electricity Infrastructure
  2. Reading: Protecting Electricity Infrastructure (Optional Video)
  3. Practice Quiz: L16 Challenge Questions
  4. 视频: L17 Electricity Subsector Cybersecurity Capability Maturity Model
  5. Reading: ES-C2M2 (Optional)
  6. Reading: Electricity Cyber Risk Management (Optional Video)
  7. Practice Quiz: L17 Challenge Questions
  8. Discussion Prompt: What do you think?
第 4 周
Module 8: Applied ES-C2M2
In this module we will take a closer look at the Electricity Subsector Cyber Capability Maturity Model and apply its tenets to different hypothetical situations. Also included in this module is course exam #4 and related project assignment. Good luck!
3 视频, 3 练习测试
  1. 视频: L18 Applying ES-C2M2 (1)
  2. Practice Quiz: L18 Challenge Questions
  3. 视频: L19 Applying ES-C2M2 (2)
  4. Practice Quiz: L19 Challenge Questions
  5. 视频: L20 Applying ES-C2M2 (3)
  6. Practice Quiz: L20 Challenge Questions
  7. Discussion Prompt: What do you think?
已评分: Exam 4
已评分: Starting a Cybersecurity Program

常见问题解答
运作方式
Coursework
Coursework

Each course is like an interactive textbook, featuring pre-recorded videos, quizzes and projects.

Help from Your Peers
Help from Your Peers

Connect with thousands of other learners and debate ideas, discuss course material, and get help mastering concepts.

Certificates
Certificates

Earn official recognition for your work, and share your success with friends, colleagues, and employers.

制作方
University of Colorado System
The University of Colorado is a recognized leader in higher education on the national and global stage. We collaborate to meet the diverse needs of our students and communities. We promote innovation, encourage discovery and support the extension of knowledge in ways unique to the state of Colorado and beyond.
价格
购买课程
访问课程材料

可用

访问评分的材料

可用

收到最终成绩

可用

获得可共享的课程证书

可用

评分和审阅
已评分 4.7,总共 5 个 42 评分
Jay Cooper

very professional course and teacher.

OM

extremely interesting and useful

MP

Great course, very informative and engaging with good optional material. I think there could be more content and more practice questions for a deeper learning experience.

Carlos Eduardo Mesquita Antunes

An introductory course on Cyber Security Policies for Water and Electricity Infrastructures



您可能也喜欢
University of Colorado System
Cybersecurity Policy for Aviation and Internet Infrastructures
1 门课程
University of Colorado System
Cybersecurity Policy for Aviation and Internet Infrastructures
查看课程
University of Colorado System
Homeland Security and Cybersecurity Future
1 门课程
University of Colorado System
Homeland Security and Cybersecurity Future
查看课程
University of Colorado System
Homeland Security & Cybersecurity Connection - It's Not About the Terrorists
1 门课程
University of Colorado System
Homeland Security & Cybersecurity Connection - It's Not About the Terrorists
查看课程
University of Colorado System
Detecting and Mitigating Cyber Threats and Attacks
1 门课程
University of Colorado System
Detecting and Mitigating Cyber Threats and Attacks
查看课程
University of Colorado System
Cyber Threats and Attack Vectors
1 门课程
University of Colorado System
Cyber Threats and Attack Vectors
查看课程
Coursera
Coursera 致力于普及全世界最好的教育,它与全球一流大学和机构合作提供在线课程。
© 2018 Coursera Inc. 保留所有权利。
通过 App Store 下载通过 Google Play 获取
  • Coursera
  • 关于
  • 管理团队
  • 工作机会
  • 目录
  • 证书
  • 学位
  • 商务
  • 政府版
  • 社区
  • 合作伙伴
  • 社区助教
  • 专业译员
  • 开发者
  • Beta 测试人员
  • 连接
  • 博客
  • Facebook
  • 领英
  • Twitter
  • Google+
  • 技术博客
  • 更多
  • 条款
  • 隐私
  • 帮助
  • 内容访问
  • 媒体
  • 联系我们
  • 目录
  • 附属公司