The Future of Cyber Security and Emerging Technologies

Consider the impact of complex technology on cyber security vulnerabilities and improve your understanding of digital security with this online course from Coventry University.

Duration

2 weeks

Weekly study

5 hours

100% online

How it works

Unlimited subscription

Learn more

Established

1992

Location

Coventry

Explore what the future holds for cyber security

On this course, you’ll explore the future of cyber security and how organisations should respond to cyber incidents. You’ll have the chance to examine emerging technologies and the security-related challenges they pose.

You’ll discuss the sophistication of growing threats to organisations that conduct their business online and whether or not a bulletproof solution for these threats is possible.

Understand threat management and critical infrastructure protection

You’ll consider what responsibilities corporate and public-sector boards have for oversight of cyber and information security.

You’ll then explore critical infrastructure protection and how it relates to the preparedness and response to serious incidents that involve the infrastructure of a region or nation.

You’ll also unpack the role of the board, the importance of cross-organisational commitment, and how the digital-dependent business world amplifies the impact of cyber attacks.

Discover emerging technologies and the Gartner Hype Cycle

Explore the impact of new technologies on cyber security and analyse the Gartner Hype Cycle, which details five different emerging technology movements that blur the lines between humans and machines.

You’ll consider key reasons why new technology systems can be more vulnerable to cyber attacks due to vulnerabilities in their hardware and software components, and the result of human error.

Finally, you’ll discuss the future of threat management, the influence this will have on corporate security and whether workplaces and employees will be able to keep up.

What topics will you cover?

  • The blurring boundaries between user apps, social networking and monetising devices
  • Security challenges and opportunities with respect to the growth of massive data stores and the Internet of Things (IoT)

More courses you might like

Learners who joined this course have also enjoyed these courses.

©2025  onlincourse.com. All rights reserved