• Specialization:ÌýCore Concepts in Data Science
  • Instructor:ÌýDr.ÌýAl Pisano,ÌýInstructor
  • Prior knowledge needed:ÌýGeneral prerequisites for the MS-DS program (see prerequisite knowledge for degree admission)

Learning Outcomes

  • Characterize the CIA principles and use them to classify a variety of cyber scenarios.
  • Identify and disseminate vulnerabilities in the data security space- social (human) and technical (digital).
  • Distinguish ethical boundaries of hacking and its applications.
  • Explore professional cybersecurity networks and connect with experts from the field.

Course Content

Duration: 2h 50m

In this module, you will learn the basics of cybersecurity and the CIA triad.

Duration: 3h

In this module, you will explore your Cyber Story and examine your pubic data profile.

Duration: 2h 40m

This module explores the world of hacking, IoT and social engineering.

Duration: 1h 50m

This session students will leverage social media to connect with cybersecurity experts and explore the ethics around cybersecurity and data.

Duration: 1h

You will connect with a cybersecurity expert , interview the contact, submit the text, audio or video of the interview and reflect on the experience and knowledge gained.

Duration: 1h

You will complete a peer reviewed project worth 28% of your grade. You must attempt the final in order to earn a grade in the course. If you've upgraded to the for-credit version of this course, please make sure you review the additional for-credit materials in the Introductory module and anywhere else they may be found.

Note: This page is periodically updated. Course information on the Coursera platform supersedes the information on this page. ClickÌýView on CourseraÌýbuttonÌýabove for the most up-to-date information.