Fundamentals of Cybersecurity
Information is the lifeblood for organizations of all types. Therefore everyone needs to have a fundamental understanding of the interdisciplinary field of cybersecurity. This course provides this fundamental knowledge by taking the learner through the evolution of the discipline from information security to cybersecurity. Learners evaluate several important laws, which have significant impact on cybersecurity strategy.
Learners also investigate multiple cybersecurity technologies, processes, and procedures; they learn how to analyze threats, vulnerabilities, and risks in these environments, and develop appropriate mitigation strategies by applying a mission-focused and risk-optimized approach.
This survey course introduces learners to the three primary sources of threats (technology, policy, and people, both internal and external) and the three classes of tools: technology, policy, and people used to develop an organizational cybersecurity strategy. This course and exercises are designed to emphasize, encourage and enhance the critical thinking abilities of learners. Although the course is not designed to prepare learners for this test, the material covered in this course includes most of the knowledge tested in the CompTIA Security+ exam.
Learners will apply their learning by performing systematic case studies of actual organizations.
max. 8 weeks
Estimated time per week
What will I learn?
Analyze the evolution of cybersecurity from the information security models of 1991 to the modern dynamic and holistic models covering people, policy, and technology with a focus on mission, risk, and governance.
Evaluate how the legal, policy, and regulatory landscape impacts organizational data classification, risks, access control and other cybersecurity requirements.
Analyze typical organizational information network, data storage, transmission, and processing architectures both on premises and in the cloud, including various technology, policy, and people threats from both inside and outside the organization.
Examine layered technical defense strategies and various technology tools and controls
Propose effective information governance policies along with incentives and penalties to shape behavior and foster a healthy cybersecurity culture in an organization.
Identify the need for appropriate communications strategies both within and outside the organization.
How will I learn?
What support will I receive?
When you have a dedicated team on your side, you'll never be alone studying at Nexford. Hailing from many different countries and with online education expertise, our faculty provides you world-class support. Ask them questions during one-to-one office hours or live chat , email them any time, and get individual feedback on your assessments.
Whilst you’re learning, you’ll also have full access to the Nexford online library, which includes access to millions of full-text articles, industry reports and key sources such as the Wall Street Journal, the Financial Times and The Economist.
LinkedIn Learning: unlimited access with Nexford
Support your Nexford goals with access to LinkedIn Learning during your program, at no additional cost. Explore the learning hub of the globe’s biggest professional networking platform to:
- Power your career: choose from over 16,000 expert-led courses, from remote working to data science
- Show off your skills: earn a certificate when you complete a course
- See what’s trending: LinkedIn Learning adds 25 new courses each week
- Tailor your learning: choose relevant courses based on your experience, LinkedIn profile and goals
- Test what you’ve learned: use LinkedIn Learning assessments