View on Coursera

Learning Outcomes

  • Characterize the CIA principles and use them to classify a variety of cyber scenarios.
  • Identify and disseminate vulnerabilities in the data security space- social (human) and technical (digital).
  • Distinguish ethical boundaries of hacking and its applications.
  • Explore professional cybersecurity networks and connect with experts from the field.

Course Content

Duration: 2h 50m

In this module, you will learn the basics of cybersecurity and the CIA triad.

Duration: 3h

In this module, you will explore your Cyber Story and examine your pubic data profile.

Duration: 2h 40m

This module explores the world of hacking, IoT and social engineering.

Duration: 1h 50m

This session students will leverage social media to connect with cybersecurity experts and explore the ethics around cybersecurity and data.

Duration: 1h

You will connect with a cybersecurity expert , interview the contact, submit the text, audio or video of the interview and reflect on the experience and knowledge gained.


Note: This page is periodically updated. Course information on the Coursera platform supersedes the information on this page. Click View on Coursera button above for the most up-to-date information.