Building a Cybersecurity Toolkit

About this Course

Technologies are always being defeated. If you own an information asset that’s valuable enough to the right adversary, it’s only a matter of time before there’s a breach. Today’s technologies attempt to keep adversaries out, but the sad fact is they will inevitably be defeated. This means a successful cybersecurity professional needs to have an expanded arsenal in their toolkit that extends far beyond technical proficiency. Cybersecurity professionals need to be agile, multifunctional, flexible, and dynamic given how quickly things can change. They need to be able to adapt to change and problem solve quickly, have diverse knowledge to perform many activities, respond to new threats and shift priorities to meet the challenge of the day. The purpose of this course is to give learners insight into these type of characteristics and skills needed for cybersecurity jobs and to provide a realistic outlook on what they really need to add to their “toolkits” – a set of skills that is constantly evolving, not all technical, but fundamentally rooted in problem-solving. Students will learn from thought leaders from both the academic and practitioner communities.

Created by: University of Washington

Level: Introductory


Related Online Courses

Technology and computers are becoming more and more capable every day. Moving forward, computers will become increasingly good at solving problems. That means humans will become the problem finders... more
In this course, you will discover the supply side of buildings’ energy chain. The first step is to consider how to convert natural resources into the energy needed by buildings: what are the o... more
Complete your introductory knowledge of computer science with this final course on objects and algorithms. Now that you've learned about complex control structures and data structures, learn to... more
Want to know how to make your product relevant worldwide? Curious what it would take to have your app release in a set of international markets? Interested in what would be needed to show your... more
In this course, you will examine the various areas of network security including intrusion detection, evidence collection and defense against cyber attacks. The issues and facilities available to... more

CONTINUE SEARCH

FOLLOW COLLEGE PARENT CENTRAL