What will you learn?
By the end of this course, you will be able toDefine and use key terms and concepts in the field of cybersecurity;
Identify and distinguish threat actors and their motivations;
Match appropriate types of controls to the actions of different threat actors;
Describe the differences and interactions among international agencies related to cybersecurity;
Describe at least two potential legal challenges to cybersecurity in your country.
About the course
This course serves as an introduction to the exciting field of cybersecurity.
As our daily lives become more and more dependent on Internet-based tools and services, and as those platforms accumulate more of our most sensitive data, the demand grows for experts in the field of cybersecurity.
In this course, you will gain an overview of the cybersecurity landscape as well as national (USA) and international perspectives on the field. We will cover the legal environment that impacts cybersecurity as well as predominant threat actors.
Program
Introduction to Cybersecurity
An introduction to cybersecurity, ideal for learners who are curious about the world of Internet security and who want to be literate in the field.
Lecturers

Barbara Endicott-Popovsky
Director, Center for Information Assurance and Cybersecurity University of Washington
Platform
All the courses on this platform are free of charge. The authors are top universities and corporations that seek to maintain high quality standards. If you do not meet a deadline for assignments, you lose points. Like on other platforms, the videos in which the theory is explained are followed by practical assignments. Courses are available in English, Chinese, Spanish, French and Hindi.