Cybersecurity and Its Ten Domains

Course Link:

Cybersecurity and Its Ten Domains
In this course you will dive into various aspects of cybersecurity and how organizations, individuals and states are interacting to protect the Internet. You will learn the historical background and current situation, as well as the present state of play. We will focus on ten different domains: five information security and two application security. We will cover how researchers and developers in cybersecurity work; what exactly is cybersecurity; the different types of cybersecurity solutions and the roles they play; and how all of us as consumers are potentially impacted by cybersecurity. We will also discuss the issue of cybersecurity in the context of today’s digital economy. The course is the culmination of the CyberSecurity Capstone project.We will cover these topics in greater detail in the CyberSecurity Capstone project, which was created by Rutgers University. More specifically, we will cover:

1. Cybersecurity landscape: What is cybersecurity threat model?
2. Security solutions: What are they and how are they available?
3. Application security: What should you look out for and how should you use?
4. Cyber attack surface: What can hackers do?
5. Risk assessment and protection: How much should you invest in cybersecurity?
6. Form, use and abuse: How secure is my data and how do I use it?
7. Entering and remaining in the security: How skilled are they?
8. Examine vulnerability: What can I do to protect my data and application?
9. Use encryption techniques: How do I protect my data?
10. Identify and avoid scams and phishing: What can I do to avoid scams and other phishing?
11. Use a risk assessment tool: How safe is my data?
12. Use encryption techniques: How can I protect my data?

This course is part of the iMBA offered by the University of Illinois, a flexible, fully-accredited online MBA at an incredibly competitive price. For more information, please see the Resource page in this course and 1: Cybersecurity and Information Security
Module 2: Application Security
Module 3: Cyber Insiders and DDoS Attacks
Module 4: Risk Analysis and Protection
Cyber Attack Defense
In this course, we will learn how to design and develop defenses using basic cyber security principles. We will also learn best practices for cybersecurity in information systems operating in the cloud, and how to protect our systems if attacked.

We will learn about physical and logical cybersecurity measures needed in all information systems operating in the cloud, such as core security measures used for basic services, as well as layered security measures such as firewalls, firewalls with penetration tests, and intrusion prevention systems. We will also learn the basic physical and logical security measures in place in all cloud-based data centers. We will learn what basic security protocols are used in all cloud-

Course Link: