Cybersecurity: Overlooked Threats to Your Strategy tackles what truly keeps cybersecurity professionals up at night: the human forces driving unconventional and asymmetric cyber attacks designed to defeat your defenses. Applying a better understanding of their drivers bolsters your cybersecurity. Beyond what is taught by most cybersecurity programs, this course shifts the focus from systems to your adversaries—examining the psychological motivations, strategic objectives, and decision-making processes of non-state cyber actors determined to outmaneuver your defenses, so you can learn how to guard against them.
Save on skills that make you shine with 40% off 3 months of Coursera Plus. Save now

您将学到什么
How cyber actors operate
The tools and techniques cyber actors use
The strategic goals of cyber actors
您将获得的技能
- Law, Regulation, and Compliance
- Cyber Security Policies
- Computer Security
- Information Systems Security
- Human Factors (Security)
- Data Security
- Cyber Security Strategy
- Security Awareness
- Public Safety and National Security
- Cybersecurity
- Risk Management
- Cyber Risk
- Cyber Attacks
- Infrastructure Security
- Malware Protection
要了解的详细信息

添加到您的领英档案
December 2025
6 项作业
了解顶级公司的员工如何掌握热门技能

该课程共有7个模块
Welcome to the introductory module for the course, "Cybersecurity: Overlooked Threats to Your Strategy." You will notice that this course is designed a bit differently than many other Coursera courses. In this module, you will first learn how to navigate this new interface. Then you will apply those navigation skills, in order to review the course goals and objectives.
涵盖的内容
1个视频1篇阅读材料1个插件
1个视频•总计2分钟
- Navigating the Course•2分钟
1篇阅读材料
- Module 1 Accessible Transcript•0分钟
1个插件•总计2分钟
- Introduction•2分钟
In this first content module, we set the stage by defining what we mean by the “cyber domain” and primarily focus on who non-state actors are in this context. We will look at how non-state actors in cyberspace evolved into significant players in global security. We will compare their capabilities with those of states and we will review how states sometimes use non-state actors as proxies to achieve their own goals. We will also look at the most common targets of these malicious actors. Understanding these dynamics is essential for anyone navigating an increasingly digital world. The influence and cyber operations of non-state cyber actors have far-reaching consequences that impact individuals, businesses, and governments alike. Gaining insight into these threats empowers us all to think more critically about digital security, privacy, and the policies that shape our online environment.
涵盖的内容
1篇阅读材料1个作业
1篇阅读材料
- Module 2 Accessible Transcript•0分钟
1个作业•总计5分钟
- Module 2 Knowledge Check•5分钟
While the previous module introduced actors and targets in the cyber domain, this lesson shifts focus to the technical side of their operations. Here, we explore the “how”—the core tools and strategies non-state actors use to conduct cyberattacks. Gaining this technical baseline is essential for understanding the tools within their arsenal. These tools enable a wide range of malicious activities. These tactics—including malware deployment, phishing schemes, manipulation through social engineering, denial-of-service (DoS) attacks, identity fabrication, and content amplification techniques —are central to the operational playbook of cybercriminals, hacktivists, terrorists, and others. Understanding how these tools work is critical to recognizing, defending against, and responding to modern cyber threats.
涵盖的内容
1篇阅读材料1个作业
1篇阅读材料
- Module 3 Accessible Transcript•0分钟
1个作业•总计5分钟
- Module 3 Knowledge Check•5分钟
Having examined the common techniques non-state actors use it’s important to understand the broader context in which these tools are deployed. In this module, we categorize the major types of cyber threats originating from non-state actors. By organizing their activities into categories such as cybercrime, cyberterrorism, cyber espionage, information operations and by analyzing common attack techniques, we can better understand the motives and impacts of each type of threat. This framework is important because it helps us make sense of a complex and evolving threat landscape, identify patterns, and develop more effective responses. These threats are no longer limited to governments or large corporations; they increasingly affect everyday people. By understanding how non-state actors operate, individuals can better recognize potential risks, safeguard their personal information, and play a role in strengthening overall digital security. We will examine examples and characteristics of each category, highlighting how these threats affect our economy, national security, and daily life.
涵盖的内容
1篇阅读材料1个作业
1篇阅读材料
- Module 4 Accessible Transcript•0分钟
1个作业•总计10分钟
- Module 4 Knowledge Check•10分钟
Having examined the types of threats non-state cyber actors pose—such as cybercrime, cyberterrorism, cyber espionage, and information operations—along with the techniques they commonly use, we now turn to explore why these actors deploy such tools and what outcomes they seek to achieve. While categorizing threats helps us understand different types of malicious cyber activity, in practice these categories often overlap. The objectives and impacts—financial gain, political destabilization, ideological influence, or disruption of critical infrastructure—can appear similar across threat types. For example, both a cybercriminal and a cyberterrorist might target the same hospital system with ransomware, but for very different reasons. Further, a single operation can also serve multiple purposes, such as combining financial gain with propaganda or using a disruptive attack to both intimidate and erode trust in institutions. Recognizing these overlapping and layered objectives is essential for understanding the complexity of non-state cyber threats. These overlaps are one reason the modules are structured as they are: by first examining techniques and threat types, and then analyzing broader strategic goals and impacts, we gain a clearer view of an evolving and interconnected threat landscape. In this module, we focus on how non-state cyber actors align their tools and techniques with strategic objectives. Through real-world examples, we’ll examine how various actors pursue influence, disruption, or advantage across sectors—shedding light on how cyber operations function as instruments of larger agendas.
涵盖的内容
1篇阅读材料1个作业
1篇阅读材料
- Module 5 Accessible Transcript•0分钟
1个作业•总计5分钟
- Module 5 Knowledge Check•5分钟
Non-state actors are now central players in global cyber conflict. While state-sponsored cyber operations often dominate headlines, the more diverse, agile, and loosely governed activities of non-state groups present equally urgent and growing risks. These actors range from criminal syndicates and ideological extremists to hacktivist collectives and private intelligence brokers. What unites them is their ability to exploit cyberspace to cause harm—often without crossing physical borders or fitting neatly into traditional categories of warfare or crime. In this module, we examine the broader global response to the challenge of non-state actors, beginning with the why: What makes non-state cyber actors such a serious threat? What consequences have already emerged from their activities, and why is the international community struggling to manage them effectively? We then turn to the how: What frameworks, tools, and legal concepts are available to governments and international organizations to deter, investigate, and respond to non-state cyber operations? What legal gaps remain? And how are new norms and responses evolving to meet the complexity of a threat that outpaces traditional policymaking?
涵盖的内容
1篇阅读材料1个作业
1篇阅读材料
- Module 6 Accessible Transcript•0分钟
1个作业•总计5分钟
- Module 6 Knowledge Check•5分钟
In this concluding module, we take stock of the current landscape and consider what can be done to address it. Cyber threats by non-state actors are not static, they evolve with technology and geopolitics. We will examine ongoing trends, such as the increasing sophistication of these actors, as well as advancements in intelligence and proactive defenses that could help counter threats. We’ll stress the ongoing importance of public awareness and strong cyber hygiene as a frontline defense. Finally, we’ll consider the legal and international initiatives already underway, as well as those still needed, to strengthen cyberspace governance and reduce risks from non-state actors.
涵盖的内容
2篇阅读材料1个作业1个插件
2篇阅读材料•总计2分钟
- Module 7 Accessible Transcript•0分钟
- Concluding Remarks•2分钟
1个作业•总计5分钟
- Module 7 Knowledge Check•5分钟
1个插件•总计3分钟
- Reaction Survey•3分钟
位教师

提供方

提供方

The University of Maryland, College Park is the state's flagship university and one of the nation's preeminent public research universities. A global leader in research, entrepreneurship and innovation, the university is home to more than 40,700 students, 14,000 faculty and staff, and nearly 400,000 alumni. The university’s faculty includes two Nobel laureates, 10 Pulitzer Prize winners, 69 members of the national academies and scores of Fulbright scholars. Located just outside Washington, D.C., the University of Maryland is committed to social entrepreneurship as the nation’s first “Do Good” campus, and discovers and shares new knowledge every day through research and programs in academics, the arts, and athletics.
人们为什么选择 Coursera 来帮助自己实现职业发展

Felipe M.

Jennifer J.

Larry W.

Chaitanya A.
常见问题
To access the course materials, assignments and to earn a Certificate, you will need to purchase the Certificate experience when you enroll in a course. You can try a Free Trial instead, or apply for Financial Aid. The course may offer 'Full Course, No Certificate' instead. This option lets you see all course materials, submit required assessments, and get a final grade. This also means that you will not be able to purchase a Certificate experience.
When you purchase a Certificate you get access to all course materials, including graded assignments. Upon completing the course, your electronic Certificate will be added to your Accomplishments page - from there, you can print your Certificate or add it to your LinkedIn profile.
Yes. In select learning programs, you can apply for financial aid or a scholarship if you can’t afford the enrollment fee. If fin aid or scholarship is available for your learning program selection, you’ll find a link to apply on the description page.
更多问题
提供助学金,

