Class Central is learner-supported. When you buy through links on our site, we may earn an affiliate commission.

Coursera

Risk Management for Cyber Security Managers

Packt via Coursera

Overview

Save Big on Coursera Plus. 7,000+ courses at $160 off. Limited Time Only!
This course equips IT managers with essential skills in cyber risk management, focusing on identifying, analyzing, and managing cybersecurity risks. Learn strategies like mitigation, avoidance, transference, and acceptance to tackle threats and vulnerabilities. Understand threat dynamics, information classification, and security control implementation. Explore vulnerability management techniques, including ethical hacking and penetration testing. Gain insights into quantitative and qualitative risk analysis methods in real-world scenarios. By course end, IT managers will be ready to implement robust strategies to defend against cyber threats and enhance their company's security posture. Learn the foundations of risk management: determine, analyze, mitigate, transfer, avoid, and monitor risks. Manage third-party cyber risks, perform ethical hacking/penetration testing, and calculate quantitative/qualitative risk analyses. Designed for IT or cybersecurity managers, this course requires a basic understanding of cybersecurity and offers comprehensive insights into cyber risk management.

Syllabus

  • Welcome to the Course
    • In this module, we will introduce the course, discuss the profession of risk management, and explore essential standards and frameworks in cybersecurity.
  • Introduction to Risk
    • In this module, we will delve into the concept of risk, types of risks, the scope of risk management, and the roles involved, as well as examine common threats and adversaries.
  • Risk Management
    • In this module, we will cover the comprehensive process of cyber risk management, including identification, assessment, mitigation, avoidance, transference, acceptance, and monitoring of risks.
  • Information Classification and Security Controls
    • In this module, we will focus on how to classify information and implement appropriate security controls to protect against cyber risks effectively.
  • Third-Party Cyber Risk Management
    • In this module, we will explore the options for third-party cyber risk management, including how to identify and evaluate third-party vendors for outsourcing risk control.
  • Vulnerability Management
    • In this module, we will discuss the identification, assessment, treatment, and reporting of security vulnerabilities, as well as the use of ethical hacking and penetration testing.
  • Incident Response
    • In this module, we will focus on preparing for and responding to cyber incidents, with an emphasis on business continuity and disaster recovery planning.
  • Conclusion
    • In this module, we will conclude the course with a summary of key concepts, reflections on the importance of cyber risk management, and a thank-you note from the author.

Taught by

Packt - Course Instructors

Reviews

Start your review of Risk Management for Cyber Security Managers

Never Stop Learning.

Get personalized course recommendations, track subjects and courses with reminders, and more.

Someone learning on their laptop while sitting on the floor.