Cybersecurity Policy
Everyone
- 15 videos | 1h 23m 9s
- Includes Assessment
Explore the landscape of cyber policy.
WHAT YOU WILL LEARN
-
Better understand what you are going to learn in this courseUnderstand the high level cyber issues facing companies todayUnderstand bug bounty programsUnderstand the system dynamics model for cybersecurityUnderstand the white hat workforceKnow what the cyber threat and security environment isUnderstand the management and governance issues around education and cybersecurity frameworksUnderstand the basics of cyber policy
-
Understand the network transport goal of cybersecurityUnderstand the policy environement that is built around open internet platformsUnderstand the characteristics that we want open interent platforms to haveUnderstand how to handle application level securityUnderstand the basics of commercial privacyKnow how to use the approach we learned in the course in other areasUnderstand the new questions that arise as new technologies pop up
IN THIS COURSE
-
2m 52sAn introduction to what you are going to learn in this course FREE ACCESS
-
6m 54sLearn about the cyber issues facing companies today and what they are doing about them FREE ACCESS
-
5m 32sLearn about bug bounty programs FREE ACCESS
-
7m 57sLearn about the system dynamics model for cybersecurity FREE ACCESS
-
5m 16sLearn about the white hat workforce FREE ACCESS
-
4m 24sFind out how the cyber threat and security environment effect how secure you are FREE ACCESS
-
3m 25sLearn about the management and governance issues around education and cybersecurity frameworks FREE ACCESS
-
3m 34sLearn why trustworthiness is important in cyber security FREE ACCESS
-
8m 59sLearn about the first public policy goal of cybersecurity FREE ACCESS
-
8m 41sLearn about the policy environment that is bulit around open internet platforms FREE ACCESS
-
7m 32sLearn the characteristics that we want open internet platforms to have FREE ACCESS
-
6m 5sLearn how to handle application level security FREE ACCESS
-
2m 44sLearn about how all of this relates to commerical privacy FREE ACCESS
-
5m 46sFind out how the approach we have learned so far will work in other areas FREE ACCESS
-
3m 30sLearn how new questions pop up as technology makes more advances FREE ACCESS
YOU MIGHT ALSO LIKE
Channel
MIT xPRO Cybersecurity