Overview
In order to manage the cybersecurity function business, you must first understand its language and its environment. This course covers the foundations of cybersecurity, including threats and vulnerabilities as well as the tools, technologies, and strategies used to manage it.
After completing this course, a learner will be able to:
● Define key concepts and terminology in Cybersecurity
● Identify threats to cybersecurity
● Identify strategies to identify and remediate vulnerabilities in information assets
● Identify the systemic components (including personnel) necessary for an effective cybersecurity program
Syllabus
- Welcome to The Foundations of Cybersecurity (Course 1)
- This is an overview of the learning objectives for the course.
- Introduction to Cybersecurity (Module 1.1)
- Learning Objectives for Introduction to Cybersecurity Module
- Threats to Cybersecurity (Module 1.2)
- Learning objectives for Threats to Cybersecurity
- Security Technologies (Module 1.3)
- Managing Vulnerabilities in Information Assets (Module 1.4)
- Learning objectives for Managing Vulnerabilities in Information Assets module
- Understanding the Cybersecurity Program (Module 1.5)
- Learning Objectives for Managing Vulnerabilities in Information Assets Module
- Wrap-up for The Foundations of Cybersecurity
Taught by
Herbert J. Mattord, Ph.D., CISM, CISSP, CDP and Michael Whitman, Ph.D., CISM, CISSP
Tags
Reviews
5.0 rating, based on 2 Class Central reviews
4.8 rating at Coursera based on 665 ratings
Showing Class Central Sort
-
I have started this course to help me improve my IT skills so that i can manage internet
security and firewalls as well as server control panels.
I believe in Cyber security because it has added my IT Consultative skills -
the course is of my best interest and i just love how the outline has been taken. i also love their tutorials are done in more simple terms for the undestanding of even a layman