Building a Cybersecurity Toolkit

David Aucsmith, UWashingtonX

Develop a set of skills and characteristics that expand beyond technical proficiency to become a successful cybersecurity professional.

Technologies are always being defeated.

If you own an information asset that’s valuable enough to the right adversary, it’s only a matter of time before there’s a breach. Today’s technologies attempt to keep adversaries out, but the sad fact is they will inevitably be defeated. This means a successful cybersecurity professional needs to have an expanded arsenal in their toolkit that extends far beyond technical proficiency.

Cybersecurity professionals need to be agile, multifunctional, flexible, and dynamic given how quickly things can change. They need to be able to adapt to change and problem solve quickly, have diverse knowledge to perform many activities, respond to new threats and shift priorities to meet the challenge of the day.

The purpose of this course is to give learners insight into these type of characteristics and skills needed for cybersecurity jobs and to provide a realistic outlook on what they really need to add to their “toolkits” – a set of skills that is constantly evolving, not all technical, but fundamentally rooted in problem-solving.

Students will learn from thought leaders from both the academic and practitioner communities.

What will you learn

By the end of this course, you will be able to:

  • Identify what tools and skills are necessary to form today’s Professional Cybersecurity toolkit;
  • Match appropriate tools to different purposes in the cybersecurity management process;
  • Synthesize insights gained in course exploration of toolkit skill sets, working toward self-evaluation of talents and interests aligned to cybersecurity’s array of roles

Dates:
  • 14 May 2019
Course properties:
  • Free:
  • Paid:
  • Certificate:
  • MOOC:
  • Video:
  • Audio:
  • Email-course:
  • Language: English Gb

Reviews

No reviews yet. Want to be the first?

Register to leave a review

Show?id=n3eliycplgk&bids=695438
NVIDIA
More from 'Computer Science':
Regular_7d911eb6-1549-4551-aef8-7a752052d4fb Social Media Analytics: Using Data to Understand Public Conversations
How can you discover what’s being said about the things that matter to you on...
Regular_1361bcd9-a334-41ef-9b5b-ce2f3b8355ef Internet of Things for Active Aging
Learn about how the Internet of Things can help people aging well with this...
Regular_6c70469a-6f1d-4ff7-bcd0-b5780b6d9fd0 Cyber Security for Small and Medium Enterprises: Identifying Threats and Preventing Attacks
Discover what common cyber threats and attacks face small and medium enterprises...
Regular_12b2b05f-d1a4-4512-a1fb-2c56cafa6174 Competitive Advantage: Using Information to Build Business Success
Learn the value of information to businesses and how it can give the business...
Regular_1926570c-cfb2-452b-8a0f-b75e61ab4458 Understanding Data in the Tourism Industry
How can you benefit from using data in your tourism business? Learn the opportunities...
More from 'edX':
Aac3b9a3-15fc-42e8-b2a9-4d9e8b58f2d9-9b7851ffec5a.small Introduction to Running Pipe in Oil and Gas Wells
Learn about the importance of proper preparation and handling of casing and...
199657a8-a0c0-4335-bc6c-1725077feb2c-85d56f5fea16.small Designing and Creating Trousers
Learn the construction and style adaptations of trousers for men and women,...
389d5e5e-7679-467e-b5bb-b21c9c86ca1f-31a7731a68f2.small Introduction to Biology - The Secret of Life
Explore the secret of life through the basics of biochemistry, genetics, molecular...
C9c58e99-326c-46ad-aa60-216c5db5bb8e-27e0ea893a6a.small Supply Chain Management: A Decision-Making Framework
Learn how to make rational and confident supply chain decisions, by understanding...
3887d951-8ecb-419a-b04a-ccf2a423b812-84789e1d3b2c.small Writing for Social Media
This course provides a framework for writing for social media by focusing on...

© 2013-2019