Learn to manage human behavior risks in cybersecurity through effective training and threat intelligence. Perfect for business security.
Learn to manage human behavior risks in cybersecurity through effective training and threat intelligence. Perfect for business security.
This course cannot be purchased separately - to access the complete learning experience, graded assignments, and earn certificates, you'll need to enroll in the full Cybersecurity: Developing a Program for Your Business Specialization program. You can audit this specific course for free to explore the content, which includes access to course materials and lectures. This allows you to learn at your own pace without any financial commitment.
4.7
(256 ratings)
18,467 already enrolled
Instructors:
English
پښتو, বাংলা, اردو, 3 more
What you'll learn
Understand the impact of human behavior on cybersecurity
Design and implement effective SETA programs
Analyze why traditional security training efforts may fail
Develop strategies to address modern security threats
Implement threat intelligence in security planning
Skills you'll gain
This course includes:
0.75 Hours PreRecorded video
7 assignments
Access on Mobile, Tablet, Desktop
FullTime access
Shareable certificate
Closed caption
Get a Completion Certificate
Share your certificate with prospective employers and your professional network on LinkedIn.
Created by
Provided by

Top companies offer this course to their employees
Top companies provide this course to enhance their employees' skills, ensuring they excel in handling complex projects and drive organizational success.





There are 4 modules in this course
This comprehensive course explores the human element in cybersecurity, known as the X-Factor. It covers the unpredictable aspects of human behavior within organizations that can lead to security breaches. The curriculum includes Security Education, Training and Awareness (SETA) programs, analysis of why training efforts may fail, and modern security challenges like hacktivism and ransomware. Through practical examples and industry insights, students learn to develop effective security awareness programs and manage human-related security risks.
Introduction to the X-Factor
Module 1 · 2 Hours to complete
Security Education: Training & Awareness
Module 2 · 2 Hours to complete
Reasons Why Traditional Training Efforts Fail
Module 3 · 4 Hours to complete
Threat Intelligence
Module 4 · 2 Hours to complete
Fee Structure
Instructors
Assistant Professor of Information Security and Assurance at Kennesaw State University
Andrew W. (Andy) Green, Ph.D., is an Assistant Professor of Information Security and Assurance in the Information Systems Department at Kennesaw State University, where he also serves as the program coordinator for the undergraduate degree in Information Security and Assurance. With nearly two decades of experience in information security, Andy has a background as a consultant for small and medium-sized businesses and has worked in healthcare IT, developing transcription interfaces for medical facilities. His research interests lie at the intersection of security, privacy, and public policy, with publications in top-tier academic journals and contributions to several academic textbooks used globally. Additionally, he frequently shares his expertise with local, regional, and national media on various information security issues.
Associate Professor Chair of Information Systems at Kennesaw State University
Dr. Traci A. Carte is the Department Chair of Information Systems in the Michael J. Coles College of Business at Kennesaw State University. She earned her Ph.D. in Management Information Systems from the University of Georgia and previously taught at the University of Oklahoma for 15 years, where she received 15 teaching awards and two best paper awards for her research. Dr. Carte's expertise encompasses business process integration, data management, and collaborative technologies, with a focus on the role of information security across these areas. Her extensive background in academia and commitment to teaching excellence make her a significant contributor to the field of Information Systems.
Testimonials
Testimonials and success stories are a testament to the quality of this program and its impact on your career and learning journey. Be the first to help others make an informed decision by sharing your review of the course.
Frequently asked questions
Below are some of the most commonly asked questions about this course. We aim to provide clear and concise answers to help you better understand the course content, structure, and any other relevant information. If you have any additional questions or if your question is not listed here, please don't hesitate to reach out to our support team for further assistance.