Homeland Security & Cybersecurity Connection - It's Not About the Terrorists

  • 4.7
Approx. 11 hours to complete

Course Summary

This course explores the connections between homeland security and cybersecurity, covering topics such as critical infrastructure protection, cyber attacks on transportation systems, and the role of social media in emergency response.

Key Learning Points

  • Learn about the intersection of homeland security and cybersecurity
  • Understand the importance of protecting critical infrastructure
  • Explore the impact of cyber attacks on transportation systems
  • Examine the role of social media in emergency response

Related Topics for further study


Learning Outcomes

  • Gain knowledge of the connections between homeland security and cybersecurity
  • Develop an understanding of the importance of protecting critical infrastructure
  • Be able to examine the role of social media in emergency response

Prerequisites or good to have knowledge before taking this course

  • Basic knowledge of cybersecurity and homeland security
  • Familiarity with social media platforms

Course Difficulty Level

Intermediate

Course Format

  • Online self-paced
  • Video lectures
  • Quizzes and assignments

Similar Courses

  • Cybersecurity and Its Ten Domains
  • Cybersecurity: Developing a Program for Your Business
  • Cybersecurity Capstone Project

Related Education Paths


Notable People in This Field

  • Bruce Schneier
  • Eugene Kaspersky

Related Books

Description

Welcome to Course 1 in CS4950, Homeland Security and Cybersecruity. In this course we examine the origins of homeland security and its connection with cybersecurity. Homeland security is about safeguarding the United States from domestic catastrophic destruction. Catastrophic destruction comes in two forms: natural and man-made. For most of history the man-made variety came in the form of warfare and required the combined resources of a nation state. All that changed March 20th, 1995. On that date, members of a quasi-religious cult in Japan attacked the Tokyo subway system using Sarin gas. It was the first deployment of a weapon of mass destruction my a non-state actor. The power of destruction once reserved to nation states was now available to small groups, even individuals. The incident was a wake up call for governments around the world. Defense establishments designed to keep rogue states in check were practically useless against non-state actors. Overnight, the number of potential enemies multiplied a hundred, maybe even a thousand-fold. In response to the Tokyo Subway Attacks, the United States took measures to protect itself from WMD attack by non-state actors. Those measures were still being enacted when the nation was attacked on 9/11. On September 11, 2001, nineteen hijackers inflicted as much damage as the Imperial Japanese Navy on December 7, 1941. The investigating 9/11 Commission noted the attacks for their "surpassing disproportion". The hijackers had achieved WMD effects without using WMD. They did this by subverting the nation's transportation infrastructure, turning passenger jets into guided missiles. Again, the security implications were profound. Non-state actors seeking to inflict domestic catastrophic destruction did not need to import, fabricate, or acquire WMD as the nation was surrounded by the means of its own destruction in the form of critical infrastructure. The vulnerability of critical infrastructure had not gone unnoticed. Again, in response to the Tokyo Subway attacks, which themselves had been an attack on Japanese infrastructure, President Clinton in 1996 commissioned a panel to investigate the threat to United States' infrastructure. The panel replied in 1997 that there was no immediate threat to US infrastructure, but they were concerned with the growing risk of cyber attack. The same cyber physical systems that fueled the explosive growth of the Internet were being incorporated into Industrial Control Systems that underpinned much of the nation's critical infrastructure. The panel noted that the knowledge and skills necessary to mount a cyber attack on the nation's infrastructure was growing. As a result of this observation, President Clinton in 1998 ordered the protection of US critical infrastructure, especially from cyber attack. Following 9/11, critical infrastructure protection and cybersecurity were designated core missions in the 2002 Homeland Security Act establishing the new Department of Homeland Security. They remain core missions to this day, but many don't see the connection. The connection is this: cybersecurity is essential to critical infrastructure protection, which is essential to homeland security, which is about safeguarding the United States from domestic catastrophic destruction. I look forward to working with you in the coming lessons. Best wishes and good luck!

Outline

  • Module 1: Domestic Catastrophic Destruction
  • About this Specialization
  • About the Instructor
  • L1 The Origin of Homeland Security
  • L2 Weapons of Mass Destruction
  • L3 9/11
  • Turning Point, pp3-10 & pp13-16 (Optional)
  • Tokyo Subway Attacks Lessons (Optional Video)
  • Turning Point, pp10-12 (Optional)
  • More About WMD (Optional Video)
  • We Have Some Planes (Optional)
  • 9/11 Lessons Learned (Optional Video)
  • L1 Challenge Questions
  • L2 Challenge Questions
  • L3 Challenge Questions
  • Module 2: HS & DHS
  • L4 Defining Homeland Security
  • L6 DHS Missions
  • Homeland Security (Optional)
  • Challenging the Definition of Homeland Security (Optional Video)
  • DHS Evolution (Optional)
  • SecDHS Remarks on Unity of Effort (Optional Video)
  • L4 Challenge Questions
  • L6 Challenge Questions
  • Exam 1
  • Module 3: Safeguarding Against Domestic Catastrophic Destruction
  • L7 Counter WMD Strategy
  • L8 Critical Infrastructure Protection
  • Counter WMD Strategy (Optional)
  • Critical Infrastructure Protection (Optional)
  • Why is Critical Infrastructure Critical? (Optional Video)
  • L7 Challenge Questions
  • L8 Challenge Questions
  • Module 4: Homeland Security and Cybersecurity
  • L5 Connecting HS & CS
  • L9 DHS Cybersecurity
  • L10 Cybersecurity Basics
  • Surpassing Disproportion (Optional)
  • Congressional Hearing (Optional Video)
  • DHS Cybersecurity (Optional)
  • TED Talk on Cybersecurity (Optional Video)
  • L5 Challenge Questions
  • L9 Challenge Questions
  • L10 Challenge Questions
  • Exam 2
  • Making the Business Case

Summary of User Reviews

Discover the connection between homeland security and cybersecurity with this course on Coursera. Students praise the course for its engaging content that provides a comprehensive understanding of the subject matter.

Key Aspect Users Liked About This Course

Engaging content that provides a comprehensive understanding of the subject matter

Pros from User Reviews

  • In-depth coverage of the topic
  • Well-structured course material
  • Engaging lectures by knowledgeable instructors
  • Flexible learning schedule
  • Practical exercises and case studies for hands-on learning

Cons from User Reviews

  • Some technical concepts may be difficult for beginners
  • Limited interaction with instructors and peers
  • No certificate of completion for audit learners
  • No live sessions or webinars
  • Requires self-discipline and motivation to complete the course
English
Available now
Approx. 11 hours to complete
Richard White
University of Colorado System
Coursera

Instructor

Richard White

  • 4.7 Raiting
Share
Saved Course list
Cancel
Get Course Update
Computer Courses