Current Status
Not Enrolled
Get Started

Approximately 3 hours to complete

Earn a record of completion

Full video production format

Course Overview

This course discusses the fundamentals of cybersecurity in a broad overview. It attempts to address cybersecurity in layman’s terms to give students a basic understanding of the principles of cybersecurity. The key for the Homeland Security professional is why cybersecurity is important to them. There are several well-documented occurrences of major breaches to local governments as well as critical infrastructure, which occurred due to lapses in fundamental security practices.

Learning Objectives

  • Define cybersecurity
  • Define the difference between cybersecurity governance and cybersecurity management
  • Define threats and vulnerabilities 
  • General understanding of defined roles
  • General understanding of risk management: Acceptance, Transference, Mitigation
  • Alignment of SECURITY (both physical and cyber) with business needs: Recovery Point Objective, Recovery Time Objective, Maximum Tolerable Downtime
  • Frameworks—very high-level understanding: Center for Internet Security, ISACA, NIST, ISO, SGP, Payment Card Industry, FFIEC
  • General understanding of strategic plans, policies, and procedures
  • General understanding of cybersecurity controls, e.g. IDS, IPS
  • General understanding of cybersecurity metrics
  • General understanding of privacy and the implications of the data we collect

digital text scrolling across a screen

Lesson 2 – Making Cybersecurity Relevant for Homeland Security

Lesson 8: Cybersecurity Strategic Plans, Cybersecurity Policies, and Cybersecurity Procedures

Lesson 9: Cybersecurity Controls and Cybersecurity Metrics

Lesson 10: Incident Response Planning and Responding to Cyber Attacks

About the Instructor

Ike Barnes (M.A., Naval Postgraduate School) is passionate about cybersecurity. During his tenure in the public sector, Ike responded to breaches both large and small, solidifying that no company is too small, nor is any entity too large to be breached. In addition to his M.A. Ike is also a Certified Information Security Manager (CISM).

Share this course:
Scroll to Top