Cyber Security for Managers: Tools for Cyber Action Plan
2.3 (2 ratings)
Instead of using a simple lifetime average, Udemy calculates a course's star rating by considering a number of different factors such as the number of ratings, the age of ratings, and the likelihood of fraudulent ratings.
7 students enrolled
Wishlisted Wishlist

Please confirm that you want to add Cyber Security for Managers: Tools for Cyber Action Plan to your Wishlist.

Add to Wishlist

Cyber Security for Managers: Tools for Cyber Action Plan

Learn, train and check your Cyber security daily! Course for non-programmers
2.3 (2 ratings)
Instead of using a simple lifetime average, Udemy calculates a course's star rating by considering a number of different factors such as the number of ratings, the age of ratings, and the likelihood of fraudulent ratings.
7 students enrolled
Last updated 4/2016
English
Price: $50
30-Day Money-Back Guarantee
Includes:
  • 1 hour on-demand video
  • Full lifetime access
  • Access on mobile and TV
  • Certificate of Completion
What Will I Learn?
  • The objective of the course is the actual training of the employees as per different types of threats.
View Curriculum
Requirements
  • Basic knowledge of how to operate in the Internet environment. The course is for non-programmers, it introduces basic concepts of Internet Security and basic tools of how to mitigate and reduce the risks.
Description

Small businesses of below 500 employees are increasingly targets of the cyber attacks, according to last reports. The average loss of each organization as a result of the attack is 190 thousands US dollars.  

This course teaches the basic concepts of cyber security is 9 steps, providing vocabulary, descriptions of most common ways the intruders can harm your business and particular guidance on how to avoid the damage. The course based on industry standards, featured literature, self paced tests and quizzes and tools on how to increase your level of security in the Cyber space.  

Who is the target audience?
  • The target audience for this course includes: business owners, high and medium level managers with zero to few years of cybersecurity experience; auditors, insurance, compliance, informations security, government, military, legal professionals with a familiarity of basic IT concepts who are new to cybersecurity. Students and recent graduates. This course is not substitution for CISSP professional Internet Security Certification.
Students Who Viewed This Course Also Viewed
Curriculum For This Course
Expand All 11 Lectures Collapse All 11 Lectures 59:29
+
Cyber security for non-programmers
11 Lectures 59:29


This is a multi-choice quiz. Each question is graded 2 points. You'll need to earn at least 80 points (B-) in order to acquire final certificate of the course.  

Quiz of Lesson 2
5 questions

Crimeware
06:09

Each question of the quiz counts 2 points in the final course grade.

Good Luck!

Quiz Lesson 3: Crimeware
5 questions

Insider breach
06:40

Quiz of Lesson 4: Insider breach
5 questions

Physical security
04:06

Quiz of Lesson 5: Physical security
5 questions

Cyber espionage
06:42

Quiz of Lesson 6: Cyber espionage
5 questions

DDOS (Distributed Denial of Service Attack)
01:24

Quiz of Lesson 7: DDOS attacks
5 questions

POS intrusions
05:15

Quiz of Lesson 8: POS intrusions
5 questions

Payments cards skimming
03:48

Quiz of Lesson 9: Payment cards skimming
5 questions

Web applications attacks
07:51

Quiz of Lesson 10: Web applications attacks
5 questions

Miscellaneous errors
05:55

Quiz of Lesson 11: Miscellaneous errors
5 questions
About the Instructor
Dr. Marina Shorer/National Security Group
2.8 Average rating
3 Reviews
18 Students
2 Courses

Dr. Marina Shorer is the author of the book 'Barter of Identity and Support', contributor for the book of the Center for Technology and Society at Berlin University of Technology and Nexus Institute for Cooperation Management and Interdisciplinary Research in Berlin “Terrorism and the Internet: Threats – Target groups – Deradicalisation strategies”. She published chapters in the book of “Online newspapers in Israel” and contributes her research articles in the International Journal of Knowledge, Culture and Change Management and in the Journal of International Communication. Dr. Shorer combines a balanced view of advanced empirical research and theoretical models. Being a former Media Liaison for the Israeli Ministry of Internal Security, she implements her knowledge of the routine of the Governmental structures with theoretical and practical tools , helping students to find new and creative solutions to upcoming issues.