Cybersecurity: Overlooked Threats to Your Strategy

Coursera Courses ↗ · Coursera

Open Course on Coursera

Free to audit · Opens on Coursera

Cybersecurity: Overlooked Threats to Your Strategy

Coursera · Beginner ·🔐 Cybersecurity ·1mo ago
Cybersecurity: Overlooked Threats to Your Strategy tackles what truly keeps cybersecurity professionals up at night: the human forces driving unconventional and asymmetric cyber attacks designed to defeat your defenses. Applying a better understanding of their drivers bolsters your cybersecurity. Beyond what is taught by most cybersecurity programs, this course shifts the focus from systems to your adversaries—examining the psychological motivations, strategic objectives, and decision-making processes of non-state cyber actors determined to outmaneuver your defenses, so you can learn how to guard against them. Led by Dr. Steve Sin, Director of the Unconventional and Asymmetric Threats Division at the University of Maryland’s National Consortium for the Study of Terrorism and Responses to Terrorism (START), learners gain the rare, adversary-centered overview missing from most cybersecurity curricula. Strengthen your strategy by understanding the human forces shaping today’s cyber threats. No technical background is required; just curiosity and a desire to understand one of today’s most pressing security challenges.
Watch on Coursera ↗ (saves to browser)
Sign in to unlock AI tutor explanation · ⚡30

Related AI Lessons

Twitter OSINT & Threat Intelligence: Toolkit for Ethical Hackers & Security Analysts
Use Twitter for OSINT and threat intelligence to enhance security posture ethically and effectively
Medium · Startup
Twitter OSINT & Threat Intelligence: Toolkit for Ethical Hackers & Security Analysts
Learn to leverage Twitter for OSINT and threat intelligence to strengthen security posture
Medium · Cybersecurity
Your Encrypted Laptop Isn’t as Safe as You Think
Encryption alone may not protect your laptop data from theft, understand the limitations and take additional measures
Medium · Cybersecurity
TCP, Firewalls, Port Forwarding & VPNs — How Data Is Sent and Secured
Learn how data is sent and secured over the internet using TCP, firewalls, port forwarding, and VPNs
Medium · Cybersecurity
Up next
Cryptography
Coursera
Watch →