Building a Cybersecurity Toolkit

Course 3 of 4: Professional Certificate® in Essentials of Cybersecurity 4 Weeks 2–5 hours per week
1269

Please select the start dates for your courses below.

Scheduled Start:

About this course

Technologies are always being defeated.

If you own an information asset that’s valuable enough to the right adversary, it’s only a matter of time before there’s a breach. Today’s technologies attempt to keep adversaries out, but the sad fact is they will inevitably be defeated. This means a successful cybersecurity professional needs to have an expanded arsenal in their toolkit that extends far beyond technical proficiency.

Cybersecurity professionals need to be agile, multifunctional, flexible, and dynamic given how quickly things can change. They need to be able to adapt to change and problem solve quickly, have diverse knowledge to perform many activities, respond to new threats and shift priorities to meet the challenge of the day.

The purpose of this course is to give learners insight into these type of characteristics and skills needed for cybersecurity jobs and to provide a realistic outlook on what they really need to add to their “toolkits” – a set of skills that is constantly evolving, not all technical, but fundamentally rooted in problem-solving.

Students will learn from thought leaders from both the academic and practitioner communities.

 

What you’ll learn

By the end of this course, you will be able to:

  • Identify the four domains of cybersecurity and the differences between their rules, regulations, and desired outcomes;
  • Explain the role of the CISO across all domains, and the differences between CISO roles among the domains;
  • Identify cybersecurity specific tools for their appropriate domains and situations.

Prerequisites

Curiosity and interest in cybersecurity

 

Who can take this course?

Unfortunately, learners from one or more of the following countries or regions will not be able to register for this course: Iran, Cuba and the Crimea region of Ukraine. While edX has sought licenses from the U.S. Office of Foreign Assets Control (OFAC) to offer our courses to learners in these countries and regions, the licenses we have received are not broad enough to allow us to offer this course in all locations. EdX truly regrets that U.S. sanctions prevent us from offering all of our courses to everyone, no matter where they live.

Meet Your Instructors

David Aucsmith headshot

David Aucsmith

Senior Principal Research Scientist, Applied Physics Lab at University of Washington
David Aucsmith is a Senior Principal Research Scientist - Applied Physics Lab at the University of Washington. He has worked in a variety of security technology areas including secure computer systems, secure communications systems, security architecture, random number generation, cryptography and cryptographic systems, steganography and network intrusion detection. Aucsmith is a former officer in the U.S. Navy and has written extensively on cybercrime, cyber espionage and cyber warfare. He has been a representative to numerous international, government and academic organizations including the National Academy advisory board on Survivability and Lethality Analysis and the Directorate Advisory Council for the National Security Directorate of Pacific Northwest National Labs. He is co-chairman of the FBI's Information Technology Study Group, a member of the President's Task Force on National Defense and Computer Technology and a member of the Department of Defense's Global Information Grid Senior Industry Review Group. Aucsmith was also U.S. industry representative to the G8 Committee on Organized, Transnational, and Technological Crime where he participated directly in the G8 summits in Paris, Berlin and Tokyo.
1269

Experience Level

Introductory

Learning Partner

University of Washington

Program Type

Professional Certificate

Subject

IT
Advanced Business Harvard X-Series