Introduction
                                    
                                        Navigating cybersecurity: Essential policies and resources
                                            
                                                ()
                                            
                                            
                                    
                                    
                                        Who is this course for?
                                            
                                                ()
                                            
                                            
                                    
                             
                            
                                1. Overview of the Cybersecurity Problem (and Solutions)
                                    
                                        The cooperative origins of the internet
                                            
                                                ()
                                            
                                            
                                    
                                    
                                        The market incentives and disincentives for security
                                            
                                                ()
                                            
                                            
                                    
                                    
                                        The role of users in cybersecurity
                                            
                                                ()
                                            
                                            
                                    
                             
                            
                                2. Overview of Federal Law and Policy
                                    
                                        Who does what in the federal government?
                                            
                                                ()
                                            
                                            
                                    
                                    
                                        Privacy and consumer protection
                                            
                                                ()
                                            
                                            
                                    
                                    
                                        Contacting law enforcement
                                            
                                                ()
                                            
                                            
                                    
                             
                            
                                3. Overview of International Law and Regulation
                                    
                                        International bodies and organizations
                                            
                                                ()
                                            
                                            
                                    
                                    
                                        Privacy in the European Union
                                            
                                                ()
                                            
                                            
                                    
                             
                            
                                4. Engaging with Federal Agencies and Law Enforcement
                                    
                                        Combatting ransomware
                                            
                                                ()
                                            
                                            
                                    
                                    
                                        Protecting critical infrastructure
                                            
                                                ()
                                            
                                            
                                    
                             
                            
                                5. Making Your Family and Organization More Secure and Resilient
                                    
                                        Personal security checkup
                                            
                                                ()
                                            
                                            
                                    
                                    
                                        Protecting your organization
                                            
                                                ()
                                            
                                            
                                    
                             
                            
                     
                        
                                
                                    Ex_Files_Cybersecurity_Policies_Resources.zip
                                    
                                        (29 KB)