Technology

Cybersecurity Fundamentals


Description
Take the first step towards safeguarding your business and critical infrastructure with this short introduction to the fundamentals of cybersecurity.

Join our course primer on cybersecurity fundamentals and become a security-savvy business professional. You'll learn about the essential elements of cyberspace and how people and businesses are vulnerable to attacks, key concepts about threats and defense, and how to develop a thoughtful plan to secure your business through risk evaluation and cost tradeoff analysis. With a deeper understanding of cybersecurity, you'll be prepared to protect your business and critical infrastructure from potential threats.

C. Donald Robinson, PhD
Instructor, Caltech CTME

In this course, you will learn to:

  • Understand the fundamental elements of cyberspace and how they can be compromised.

  • Be aware of cyber-attacks and defense strategies to holistically integrate cybersecurity into your business.

  • Develop a risk and cost tradeoff analysis to create a deliberate investment strategy for enhanced security.

This is a four-hour, non-technical overview of key topics and their application in a business environment for the purpose of building familiarity and early subject literacy. Combine this course with others to comprehensively understand broad technological change affecting most industries. Each chapter takes about 20 minutes and ends with a two-question learning check focusing on topic recall and retention.

This short course is ideal for most business function personnel across the enterprise, including products and services, accounting, sales and marketing, operations, and supporting roles.

Content
  • Basics
  • Welcome!
  • Introduction
  • Course Outline
  • Summary Deck
  • Chapter 1: The Elements of Cyberspace
  • The Elements of Cyberspace
  • Chapter 1: Knowledge Check
  • Article
  • Chapter 2: Cyber Attack Patterns
  • Cyber Attack Patterns
  • Chapter 2: Knowledge Check
  • Article
  • Chapter 3: Security Control Frameworks
  • Security Control Frameworks
  • Chapter 3: Knowledge Check
  • Article
  • Chapter 4: Implementation of Security Controls
  • Implementation of Security Controls
  • Chapter 4: Knowledge Check
  • Article
  • Chapter 5: Cyber Information Sharing
  • Cyber Information Sharing
  • Chapter 5: Knowledge Check
  • Article
  • Chapter 6: Personnel Security
  • Personnel Security
  • Chapter 6: Knowledge Check
  • Article
  • Chapter 7: Supply Chain Security
  • Supply Chain Security
  • Chapter 7: Knowledge Check
  • Article
  • Chapter 8: The Legal Landscape in Cybersecurity
  • The Legal Landscape in Cybersecurity
  • Chapter 8: Knowledge Check
  • Article
  • Chapter 9:
  • Risk Management and Strategy Development
  • Chapter 9: Knowledge Check
  • Article
  • Course Completion
  • Final Quiz
  • Course Feedback
Completion rules
  • All units must be completed