❗The content presented here is sourced directly from Coursera platform. For comprehensive course details, including enrollment information, simply click on the 'Go to class' link on our website.
Updated in [May 25th, 2023]
This course will provide an overview of the aviation and Internet infrastructures, and the policies that have been developed to help guide and strengthen their cybersecurity programs. It will examine the Department of Homeland Security's National Protection and Programs Directorate, the Transportation Security Administration and Federal Aviation Administration's regulatory oversight of the aviation subsector, and the Department of Homeland Security's sole responsibility as the Sector-Specific Agency for the Internet subsector. The course will also explore the Transportation Roadmap and CARMA, which are predicated on a continuous improvement process that engages the whole organization in identifying and implementing incremental changes to enhance cybersecurity practices based on prevailing standards.
[Applications]
Upon completion of this course, students should be able to apply the concepts and principles of the Transportation Roadmap and CARMA to their own organizations. They should be able to identify the key elements of the Roadmap and CARMA, and understand how to use them to develop and implement a comprehensive cybersecurity program. Additionally, students should be able to identify the roles and responsibilities of the SSAs in the aviation and Internet subsectors, and understand the importance of collaboration between the SSAs and other stakeholders in the aviation and Internet infrastructures.
[Career Paths]
1. Cybersecurity Analyst: Cybersecurity Analysts are responsible for monitoring and analyzing security threats, developing security policies, and implementing security measures to protect an organization’s data and systems. They must stay up-to-date on the latest security trends and technologies, and be able to identify and respond to potential threats. As the aviation and Internet infrastructures become increasingly interconnected, the demand for Cybersecurity Analysts with expertise in both sectors is expected to grow.
2. Cybersecurity Engineer: Cybersecurity Engineers are responsible for designing, developing, and implementing security solutions to protect an organization’s data and systems. They must have a deep understanding of the latest security technologies and be able to develop and implement solutions that meet the organization’s security needs. As the aviation and Internet infrastructures become increasingly interconnected, the demand for Cybersecurity Engineers with expertise in both sectors is expected to grow.
3. Cybersecurity Consultant: Cybersecurity Consultants are responsible for providing advice and guidance to organizations on how to best protect their data and systems. They must have a deep understanding of the latest security trends and technologies, and be able to provide tailored advice and solutions to meet the organization’s security needs. As the aviation and Internet infrastructures become increasingly interconnected, the demand for Cybersecurity Consultants with expertise in both sectors is expected to grow.
4. Cybersecurity Manager: Cybersecurity Managers are responsible for overseeing the security of an organization’s data and systems. They must have a deep understanding of the latest security trends and technologies, and be able to develop and implement security policies and procedures that meet the organization’s security needs. As the aviation and Internet infrastructures become increasingly interconnected, the demand for Cybersecurity Managers with expertise in both sectors is expected to grow.
[Education Paths]
1. Bachelor of Science in Cybersecurity: This degree program provides students with the knowledge and skills to protect computer networks and systems from cyber threats. Students learn about the fundamentals of computer networks, cryptography, and security protocols. They also learn about the legal and ethical implications of cybersecurity, as well as the latest technologies and tools used to protect networks. This degree is becoming increasingly popular as the need for cybersecurity professionals grows.
2. Master of Science in Cybersecurity: This degree program provides students with advanced knowledge and skills in the field of cybersecurity. Students learn about the latest technologies and tools used to protect networks, as well as the legal and ethical implications of cybersecurity. They also learn about the fundamentals of computer networks, cryptography, and security protocols. This degree is becoming increasingly popular as the need for cybersecurity professionals grows.
3. Doctor of Philosophy in Cybersecurity: This degree program provides students with the highest level of knowledge and skills in the field of cybersecurity. Students learn about the latest technologies and tools used to protect networks, as well as the legal and ethical implications of cybersecurity. They also learn about the fundamentals of computer networks, cryptography, and security protocols. This degree is becoming increasingly popular as the need for cybersecurity professionals grows.
4. Certificate in Cybersecurity: This certificate program provides students with the basic knowledge and skills in the field of cybersecurity. Students learn about the fundamentals of computer networks, cryptography, and security protocols. They also learn about the legal and ethical implications of cybersecurity, as well as the latest technologies and tools used to protect networks. This certificate is becoming increasingly popular as the need for cybersecurity professionals grows.
Course Syllabus
Module 9: Aviation Infrastructure & Transportation Roadmap
In this module will examine the aviation subsector and the Transportation Roadmap for strengthening this infrastructure's resistance to cyber attack.Module 10: Applied Transportation Roadmap
In this module we will examine the difference between cybersecurity for fixed versus mobile assets, and take a closer look at the Transportation Roadmap and apply its tenets to different hypothetical situations. Also included in this module is course exam #5. Good luck!Module 11: Internet Infrastructure & CARMA
In this module will examine the Internet subsector and the Cyber Assessment Risk Management Approach for strengthening this infrastructure's resistance to cyber attack.Module 12: Applied CARMA
In this module we will take a closer look at the Cyber Assessment and Risk Management Approach and apply its tenets to different hypothetical situations. Also included in this module is the course exam #6 and related project assignment. Good luck!