Curriculum

13 Topics
Foundations: An Introduction
What is Cyber?
What is Security?
Demystifying the Cybersecurity Problem
The Threat Landscape
Threat Landscape Challenge
Examples of Cyber Incidence
Practical Questions
Optional Reading: Harry C & Gallagher N “ Classifying Cyber Events: A Proposed Taxonomy”
National Research Council “At the Nexus of Cybersecurity and Public Policy” Ch. 1
Avast 2020 Threat Landscape Report
James R. Clapper Worldwide Threat Assessment of the US Intelligence Community (Feb. 2015) – pp. 1-4
Week 1 Quiz

8 Topics
Academic Inspiration and a World Changing Idea
Government Support and Prototyping
Private Sector Support and Moving the Internet Out of the Lab
Privatizing and Scaling the Internet
Building the World Wide Web
The Internet as a Global Commons
Leiner Cerf et. al. A Brief History of the Internet – pp. 1-9
Week 2 Quiz

11 Topics
How Data Moves: Encapsulation
How Data Moves: Application Layer
How Data Moves: Network Layer
How Data Moves: Physical Layer
What is Governance?
Governing the Internet
Vangie Beal “The 7 layers of the OSI Model” Webopedia
Joseph S. Nye Jr. “The Regime Complex for Managing Global Cyber Activities” Global Commission on Internet Governance“ 2014
Assante & Bochman “IoT Automation Autonomy and Megacities in 2025: A Dark Preview” Center for Strategic & International Studies April 2017
Fischer “The Internet of Things: Frequently Asked Questions” Congressional Research Service Oct 2015
Week 3 Quiz

10 Topics
Threat Actors: Who Are the Hackers?
Threat Actors: Hobbyists
Threat Actors: Criminal Organizations
Cyber Crime Case Study: The San Francisco Muni Attack
Threat Actors: Hacktivists
Threat Actors: Advanced Persistent Threats
Cybersecurity Threats Impacting the Nation
Fire Eye “APT28 Cybergroup Activity”
Lillian Ablon Martin C. Libicki Andrea A. Golay Markets for cybercrime tools and stolen data RAND Corporation
Week 4 Quiz

11 Topics
Hacking As a Process
Reconnaissance
Weaponization
Delivery
Exploitation and Installation
Command and Control
Effects
Lockheed Martin Cyber Kill chain
MITRE ATT&CK Framework
Boebert W. Earl “A Survey of Challenges in Attribution” in National Research Council Proceedings of a Workshop on Deterring Cyberattacks 2010 pp. 41-52.
Week 5 Quiz

8 Topics
Framing Effects
Primary Effects
Secondary Effects
Second Level Effects
A Strategic Approach to Cybersecurity
Harry C & Gallagher N “ Classifying Cyber Events: A Proposed Taxonomy” CISSM
Week 6 Quiz
Course Final Project

  Write a Review

Cybersecurity for Everyone

Go to Free Course