Cybersecurity and Mobility

  • 4.5
Approx. 14 hours to complete

Course Summary

This course covers the basics of cybersecurity in the context of mobile devices and networks. Students will learn about common threats and vulnerabilities, as well as how to secure mobile devices and networks.

Key Learning Points

  • Learn about mobile security threats and vulnerabilities
  • Develop skills to secure mobile devices and networks
  • Understand the basics of cybersecurity in the context of mobile technology

Job Positions & Salaries of people who have taken this course might have

    • USA: $75,000
    • India: ₹ 6,00,000
    • Spain: € 30,000
    • USA: $75,000
    • India: ₹ 6,00,000
    • Spain: € 30,000

    • USA: $100,000
    • India: ₹ 8,00,000
    • Spain: € 40,000
    • USA: $75,000
    • India: ₹ 6,00,000
    • Spain: € 30,000

    • USA: $100,000
    • India: ₹ 8,00,000
    • Spain: € 40,000

    • USA: $95,000
    • India: ₹ 7,50,000
    • Spain: € 35,000

Related Topics for further study


Learning Outcomes

  • Understand the basics of mobile security
  • Learn about mobile security threats and vulnerabilities
  • Develop skills to secure mobile devices and networks

Prerequisites or good to have knowledge before taking this course

  • Basic understanding of cybersecurity concepts
  • Familiarity with mobile devices and networks

Course Difficulty Level

Intermediate

Course Format

  • Online self-paced course
  • Video lectures
  • Quizzes and assignments
  • Discussion forums

Similar Courses

  • Introduction to Cybersecurity
  • Network Security Fundamentals
  • Mobile Application Security and Penetration Testing

Related Education Paths


Notable People in This Field

  • Bruce Schneier
  • Mikko Hyppönen

Related Books

Description

This course is for you if you are interested in transitioning toward a managerial role in cybersecurity and mobility. Through interviews with industry experts in this area, you will be able to analyze innovations powering the rapid spread of information technology and how they present new challenges for protecting data. For example, mobile devices increase convenience but often bypass traditional security measures. After this course, you will be able to describe how the nature of the threat evolves, as culprits employ a burgeoning set of sophisticated tools to take advantage of our growing reliance on networks for critical-data exchange.

Outline

  • Welcome to the Course!
  • Welcome Video
  • Next Steps – How to Successfully Complete This Course
  • SAP's Chris and Mandy on Corporate Mobility Trends
  • Learning Objectives
  • Mobility is Changing the World
  • What is Cybersecurity?
  • Enterprise Mobility and Its impact on IT
  • CIO Strategies for Consumerization:The Future of Enterprise Mobile Computing
  • Managing Employees’ Use of Mobile Technologies to Minimize Work-Life Balance Impacts
  • Cybersecurity Reading Quiz
  • Challenge Your Existing Knowledge!
  • Mobility Inc.
  • What is BYOD?
  • Mobility and Cloud Computing
  • Mobility and Globalization
  • Mobility and the Modern Workforce
  • Mobility and the Internet of Things
  • SAP's Chris and Mandy on BYOD and Policy Management
  • Learning Objectives
  • Mobility and the Internet of Things – CIO Executive Interview
  • Using Mobile Technology to Improve Maternal Health and Fight Ebola: A Case Study of Mobile Innovation in Nigeria.
  • Increasing Organizational Performance by Transforming into a Mobile Enterprise
  • Mobility Inc. Quiz
  • Cybersecurity
  • Importance of Cybersecurity
  • SAP's Chris and Mandy on Mobility, Cybersecurity, and IoT
  • The Mobility Threat Ecosystem
  • Learning Objectives
  • Cybersecurity in the Age of Mobility: Building a Mobile Infrastructure that Promotes Productivity
  • Why IT Executives Should Help Employees Secure Their Home Computers
  • Effective Information Security Requires a Balance of Social and Technology Factors.
  • The Evolution of Information Governance at Intel
  • Home Computer Security Reading Quiz
  • Cybersecurity Quiz
  • What's Next?
  • The Gartner Hype Cycle
  • SAP's Chris and Mandy on the Future of Mobility and Cybersecurity
  • The Future of Cybersecurity
  • The Future of Mobility
  • Video Conclusion
  • Learning Objectives
  • IT Consumerization: When Gadgets Turn into Enterprise IT Tools.
  • Cybersecurity and Mobility: Securing the Mobile Frontier
  • Achieving High Performance in a Mobile and Green Workplace: Lessons from Microsoft Netherlands
  • The Future of Mobility: Scenarios for the United States in 2030.
  • IT Consumerization Reading Quiz
  • Final Quiz

Summary of User Reviews

Read reviews for the Cybersecurity and Mobility course on Coursera to learn about the experience of other users. The course has received positive feedback from many users. One key aspect that users thought was good is the comprehensive coverage of cybersecurity and mobility topics.

Pros from User Reviews

  • Comprehensive coverage of cybersecurity and mobility topics
  • Engaging and interactive course content
  • Great instructors who are knowledgeable and helpful
  • Flexible schedule that allows for self-paced learning
  • Valuable hands-on assignments and practical exercises

Cons from User Reviews

  • Some technical issues with the platform
  • Occasional difficulty in understanding complex topics
  • Lack of depth in certain areas
  • Limited interaction with other students
  • Occasional delay in receiving feedback
English
Available now
Approx. 14 hours to complete
Dr. Humayun Zafar, CEH, CISM, CRISC, PCIP
University System of Georgia
Coursera
Share
Saved Course list
Cancel
Get Course Update
Computer Courses