Overview
Save Big on Coursera Plus. 7,000+ courses at $160 off. Limited Time Only!
In this specialization, you will learn how to define Cybersecurity risk and discuss the threats that create it while you also learn to describe the role of Cybersecurity management in the management of Cybersecurity risk. You will go on to understand the elements of a general risk management framework as well as how to develop and administer a risk management effort. Along the way you will learn about the dominant standards and frameworks in risk management, and the tools used to support them.
Syllabus
Course 1: Cybersecurity Foundations for Risk Management
- Offered by Kennesaw State University. In order to manage the cybersecurity function business, you must first understand its language and its ... Enroll for free.
Course 2: A General Approach to Risk Management
- Offered by Kennesaw State University. Every organization uses its information to support its business operations. When there are threats in ... Enroll for free.
Course 3: Dominant Risk Management Standards and Frameworks
- Offered by Kennesaw State University. Organizations with little experience in risk management will want to look to national and ... Enroll for free.
Course 4: Implementing a Risk Management Framework
- Offered by Kennesaw State University. The ultimate destination for a security manager is the Chief Information Security Officer (or Chief ... Enroll for free.
- Offered by Kennesaw State University. In order to manage the cybersecurity function business, you must first understand its language and its ... Enroll for free.
Course 2: A General Approach to Risk Management
- Offered by Kennesaw State University. Every organization uses its information to support its business operations. When there are threats in ... Enroll for free.
Course 3: Dominant Risk Management Standards and Frameworks
- Offered by Kennesaw State University. Organizations with little experience in risk management will want to look to national and ... Enroll for free.
Course 4: Implementing a Risk Management Framework
- Offered by Kennesaw State University. The ultimate destination for a security manager is the Chief Information Security Officer (or Chief ... Enroll for free.
Courses
-
In order to manage the cybersecurity function business, you must first understand its language and its environment. This course covers the foundations of cybersecurity, including threats and vulnerabilities as well as the tools, technologies, and strategies used to manage it. After completing this course, a learner will be able to: ● Define key concepts and terminology in Cybersecurity ● Identify threats to cybersecurity ● Identify strategies to identify and remediate vulnerabilities in information assets ● Identify the systemic components (including personnel) necessary for an effective cybersecurity program
-
Every organization uses its information to support its business operations. When there are threats in the internal and external environments, they create the risk of information loss or damage. This course examines the design and construction of a risk management program, including policies and plans, to support the identification and treatment of risk to the organization’s information assets.
-
The ultimate destination for a security manager is the Chief Information Security Officer (or Chief Security Officer) a senior executive role responsible for all cybersecurity operations in the organization. But how do you get from entry-level IT or security employee to the CISO’s office and what do you need to know when you get there? This course examines the career path and requirements to be an effective CISO, as well as the roles and responsibilities of the position. In this course, a learner will be able to: ● Identify the career development and path of a Cybersecurity professional from entry-level to CISO ● Define and describe the role and function of a CISO in planning for cybersecurity ● Identify the development of a cybersecurity governance program and the role the CISO would play in it ● Discuss the strategic responsibilities of the CISO in overseeing an organization’s cybersecurity program
-
Organizations with little experience in risk management will want to look to national and international organizations for guidance in designing and implementing their risk management efforts. There are two dominant organizations that offer guidance in this area: the U.S. National Institute for Standards in Technology (NIST) and the International Standards Organization. This course examines the risk management frameworks and standards offered by these organization and then discusses other available approaches. The course concludes with a discussion of applications and tools to support the organization’s risk management effort.
Taught by
Herbert J. Mattord, Ph.D., CISM, CISSP, CDP and Michael Whitman, Ph.D., CISM, CISSP