What is the X-Factor? In Cybersecurity, the X-Factor related to unknown and unpredictable human behavior within and outside of your organization. “No one really knows why humans do what they do”, (David K. Reynolds), and because of this organizations can be unprepared for malicious, untrained, or even best intentioned behavior that can cause alarm and sometimes irreparable harm.
Dr. Humayun Zafar, CEH, CISM, CRISC, PCIPProfessor of Information Security and Assurance
The University System of Georgia is composed of 28 higher education institutions including 4 research universities, 2 regional universities, 12 state universities, 13 state colleges and the Skidaway Institute of Oceanography. The Georgia Public Library System, encompassing 61 library systems throughout Georgia, is also part of the University System.
- 5 stars
- 4 stars
- 3 stars
- 2 stars
- 1 star
來自CYBERSECURITY AND THE X-FACTOR的熱門評論
This course is really helpful for those who are doing research in cyber security and related to human traits. It gave me new research area that what we can do in future. Once again thanks coursera.
There is a lot of practical and actionable information in this course related to cybersecurity. I would highly recommend anyone interested in their organization's cybersecurity take this course!
This was a pretty challenging course. The sections on theories of human behavior were a bit deep but they did help me to understand how human behavior is so important improving cyber security.
It is one of the best course if you want to know about Cyber-security and how Organisations prepare against threats. Thanks to CourseEra and the teachers. 5 stars from my side.
關於 Cybersecurity: Developing a Program for Your Business 專項課程
Cybersecurity is an essential business skill for the evolving workplace. For-profit companies, government agencies, and not-for-profit organizations all need technologically proficient, business-savvy information technology security professionals. In this Specialization, you will learn about a variety of processes for protecting business assets through policy, education and training, and technology best practices. You’ll develop an awareness of the risks and cyber threats or attacks associated with modern information usage, and explore key technical and managerial topics required for a balanced approach to information protection. Topics will include mobility, the Internet of Things, the human factor, governance and management practices.