Cybersecurity Policy for Water and Electricity Infrastructures

  • 4.6
Approx. 9 hours to complete

Course Summary

Learn about the policies and practices that ensure the cybersecurity of water and electricity infrastructure in this course. With a focus on the intersection of cybersecurity and critical infrastructure, you will gain a deep understanding of the challenges and solutions in protecting these vital resources.

Key Learning Points

  • Explore the unique challenges of securing water and electricity infrastructure
  • Learn about the policies and regulations related to cybersecurity in critical infrastructure
  • Gain practical skills in risk assessment, incident response, and vulnerability management

Job Positions & Salaries of people who have taken this course might have

  • Cybersecurity Analyst
    • USA: $78,000
    • India: ₹750,000
    • Spain: €45,000
  • Security Consultant
    • USA: $105,000
    • India: ₹1,200,000
    • Spain: €60,000
  • Infrastructure Security Manager
    • USA: $120,000
    • India: ₹1,500,000
    • Spain: €75,000

Related Topics for further study


Learning Outcomes

  • Understand the unique challenges of securing water and electricity infrastructure
  • Be familiar with the policies and regulations related to cybersecurity in critical infrastructure
  • Gain practical skills in risk assessment, incident response, and vulnerability management

Prerequisites or good to have knowledge before taking this course

  • Basic knowledge of cybersecurity concepts
  • Familiarity with water and electricity infrastructure

Course Difficulty Level

Intermediate

Course Format

  • Online self-paced course
  • Video lectures
  • Hands-on exercises
  • Quizzes and assessments
  • Discussion forums

Similar Courses

  • Cybersecurity in the Energy Sector
  • Cybersecurity for Industrial Control Systems

Related Education Paths


Notable People in This Field

  • Former Under Secretary for the National Protection and Programs Directorate
  • Former Director of the Cybersecurity and Infrastructure Security Agency

Related Books

Description

This course will examine the drinking water and electricity infrastructures, and various policies that have been developed to help guide and strengthen their cybersecurity programs. The drinking water and electricity infrastructures are two of fourteen subsectors comprising what are known as "lifeline infrastructure". The 2013 National Infrastructure Protection Plan identifies four lifeline infrastructure sectors: 1) water, 2) energy, 3) transportation, and 4) communications. These sectors are designated "lifeline" because many other infrastructures depend upon them. The drinking water subsector is part of the water sector, and the electricity subsector is part of the energy sector. Both subsectors are overseen by the Department of Homeland Security National Protection and Programs Directorate which manages the DHS National Infrastructure Protection Program. The NIPP employs a five-step continuous improvement program called the Risk Management Framework. NIPP implementation is overseen by DHS-designated Sector-Specific Agencies staffed by various Federal departments. The Sector-Specific Agencies work in voluntary cooperation with industry representatives to apply the Risk Management Framework and document results in corresponding Sector-Specific Plans. The program began in 2007 and the most recent Sector-Specific Plans were published in 2016. In February 2013, President Obama issued Executive 13636 directing the National Institute of Standards and Technology to develop a voluntary set of recommendations for strengthening infrastructure cybersecurity measures. EO13636 also asked Federal agencies with regulating authority to make a recommendation whether the NIST Cybersecurity Framework should be made mandatory. The Environmental Protection Agency who is both the SSA and regulatory authority for the drinking water subsector recommended voluntary application of the NIST Cybersecurity Framework. The Department of Energy who is both the SSA and regulatory authority for the electricity subsector replied that it was already implementing the Electricity Subsector Cybersecurity Capability Maturity Model, which indeed was what the NIST Cybersecurity Framework was based on. The Department of Energy, though, recommended voluntary application of the ES-C2M2. This module will examine both the drinking water and electricity lifeline infrastructure subsectors, and elements and application of the NIST Cybersecurity Framework and ES-C2M2.

Outline

  • Module 5: Water Infrastructure & NIST Cybersecurity Framework
  • Course 2 Introduction
  • L11 Water Infrastructure
  • L12 NIST Cybersecurity Framework
  • Water: International Perspective (Optional Video)
  • NIST Cybersecurity Framework (Optional)
  • More on NIST CSF (Optional Video)
  • L11 Challenge Questions
  • L12 Challenge Questions
  • Module 6: Applied NIST Cybersecurity Framework
  • L13 Applying NIST CSF (1)
  • L14 Applying NIST CSF (2)
  • L15 Applying NIST CSF (3)
  • L13 Challenge Questions
  • L14 Challenge Questions
  • L15 Challenge Questions
  • Exam 3
  • Module 7: Electricity Infrastructure & ES-C2M2
  • L16 Electricity Infrastructure
  • L17 Electricity Subsector Cybersecurity Capability Maturity Model
  • Protecting Electricity Infrastructure (Optional Video)
  • ES-C2M2 (Optional)
  • Electricity Cyber Risk Management (Optional Video)
  • L16 Challenge Questions
  • L17 Challenge Questions
  • Module 8: Applied ES-C2M2
  • L18 Applying ES-C2M2 (1)
  • L19 Applying ES-C2M2 (2)
  • L20 Applying ES-C2M2 (3)
  • L18 Challenge Questions
  • L19 Challenge Questions
  • L20 Challenge Questions
  • Exam 4
  • Starting a Cybersecurity Program

Summary of User Reviews

Learn about cybersecurity policy for water and electricity with this comprehensive course on Coursera. Students have rated this course highly for its informative content and engaging delivery.

Key Aspect Users Liked About This Course

Many users appreciated the in-depth coverage of cybersecurity policy for the water and electricity industries.

Pros from User Reviews

  • Great course material and excellent delivery
  • Informative and practical content
  • Engaging and thought-provoking topics
  • Well-structured and easy to follow course
  • Highly relevant to current cybersecurity issues

Cons from User Reviews

  • Course can be challenging for those with limited knowledge of cybersecurity
  • Some users found the course to be too technical
  • Not enough depth in certain areas
  • Lack of interaction with course instructors
  • Limited practical exercises for hands-on learning
English
Available now
Approx. 9 hours to complete
Richard White
University of Colorado System
Coursera

Instructor

Richard White

  • 4.6 Raiting
Share
Saved Course list
Cancel
Get Course Update
Computer Courses