Juniata Classifieds>Juniata Online Courses>Building a Cybersecurity Toolkit

Building a Cybersecurity Toolkit

About this Course

Technologies are always being defeated. If you own an information asset that’s valuable enough to the right adversary, it’s only a matter of time before there’s a breach. Today’s technologies attempt to keep adversaries out, but the sad fact is they will inevitably be defeated. This means a successful cybersecurity professional needs to have an expanded arsenal in their toolkit that extends far beyond technical proficiency. Cybersecurity professionals need to be agile, multifunctional, flexible, and dynamic given how quickly things can change. They need to be able to adapt to change and problem solve quickly, have diverse knowledge to perform many activities, respond to new threats and shift priorities to meet the challenge of the day. The purpose of this course is to give learners insight into these type of characteristics and skills needed for cybersecurity jobs and to provide a realistic outlook on what they really need to add to their “toolkits” – a set of skills that is constantly evolving, not all technical, but fundamentally rooted in problem-solving. Students will learn from thought leaders from both the academic and practitioner communities.

Created by: University of Washington

Level: Introductory


Related Online Courses

Is my program correct? Will it give the right output for all possible permitted inputs? Computers are now essential in everyday life. Incorrect programs lead to frustration in the best case and... more
Processing information is the hallmark of all modern organizations, which are increasingly digital: absorbing, processing and generating information is a key element of their business. Being able... more
Every day, our computers and phones correct our spelling, curate our social media, or translate news articles for us. But have you ever wondered how these applications work on a basic level? It... more
As the Internet of Things (IoT) continues to grow so will the number of privacy and security concerns and issues. As a professional working in the field, it is essential to understand the potential... more
In this course, you will discover the supply side of buildings’ energy chain. The first step is to consider how to convert natural resources into the energy needed by buildings: what are the o... more

CONTINUE SEARCH

FOLLOW COLLEGE PARENT CENTRAL