Building a Cybersecurity Toolkit

About this Course

Technologies are always being defeated. If you own an information asset that’s valuable enough to the right adversary, it’s only a matter of time before there’s a breach. Today’s technologies attempt to keep adversaries out, but the sad fact is they will inevitably be defeated. This means a successful cybersecurity professional needs to have an expanded arsenal in their toolkit that extends far beyond technical proficiency. Cybersecurity professionals need to be agile, multifunctional, flexible, and dynamic given how quickly things can change. They need to be able to adapt to change and problem solve quickly, have diverse knowledge to perform many activities, respond to new threats and shift priorities to meet the challenge of the day. The purpose of this course is to give learners insight into these type of characteristics and skills needed for cybersecurity jobs and to provide a realistic outlook on what they really need to add to their “toolkits” – a set of skills that is constantly evolving, not all technical, but fundamentally rooted in problem-solving. Students will learn from thought leaders from both the academic and practitioner communities.

Created by: University of Washington

Level: Introductory


Related Online Courses

The world around us becomes immersed in technology, which is ultimately driven by programming and governed by its laws. We believe that high-level knowledge of means for programming ‒ past, p... more
In this course you will learn how to build AR apps with Xcode and look at the different ways to integrate web content into your iOS apps.Created by: Curtin UniversityLevel: Introductory more
¿Y si la solución a muchas de las problemáticas sociales se diera al interconectarnos mejor entre humanos y el mundo real por medio de dispositivos electrónicos? Desde esta posibilidad se abo... more
Building and distributing software that is secure throughout its entire lifecycle can be challenging, leaving many projects unprepared to build securely by default. Attacks and vulnerabilities can... more
El mayor activo de las empresas actuales son sus datos, datos que, mayoritariamente se alojan en bases de datos relacionales en línea. Prácticamente todos los sistemas de gestión de bases de da... more

CONTINUE SEARCH

FOLLOW COLLEGE PARENT CENTRAL