Cybersecurity and the X-Factor

Coursera Courses ↗ · Coursera

Open Course on Coursera

Free to audit · Opens on Coursera

Cybersecurity and the X-Factor

Coursera · Beginner ·🔐 Cybersecurity ·1mo ago
What is the X-Factor? In Cybersecurity, the X-Factor related to unknown and unpredictable human behavior within and outside of your organization. “No one really knows why humans do what they do”, (David K. Reynolds), and because of this organizations can be unprepared for malicious, untrained, or even best intentioned behavior that can cause alarm and sometimes irreparable harm. This course will introduce you to the types of training available to reduce the impact of the X-Factor, evaluate its effectiveness, explore the Security Education, Training and Awareness (SETA) program, and learn why it may fail. The course will conclude with information designed to assist you with some critical components for your business security program. Activities focused on hactivism, cyberinsurance, and ransomware will round out your knowledge base. Your team of instructors has prepared a series of readings, discussions, guest lectures, and quizzes to engage you in this exciting topic.
Watch on Coursera ↗ (saves to browser)
Sign in to unlock AI tutor explanation · ⚡30

Related AI Lessons

How to secure your macOS games
Secure your macOS games with these steps to protect your device from potential threats
Dev.to · GuardingPearSoftware
The Hidden Risk in Emergency Evacuation Plans Nobody Talks About
Organizations struggle to identify who is inside their buildings during emergencies, posing a hidden risk in evacuation plans
Medium · Cybersecurity
3 Key Takeaways on Why Cybersecurity Product Management Matters More Than Ever
Cybersecurity product management is crucial for building trust in digital products, learn how to prioritize security in product design
Medium · Cybersecurity
The Coding Challenge That Came for Your development Directory: Anatomy of a Job Interview Infostealer
Learn to identify and protect against malicious coding challenges that can steal sensitive information from your development directory
Dev.to · Alex Chen
Up next
Cryptography
Coursera
Watch →