Introduction to Cybersecurity & Risk Management
University of California, Irvine via Coursera Specialization
-
18
-
- Write review
Overview
In this case-based Specialization, you will be introduced to the field of cybersecurity through the world of security governance and risk management.
Throughout this program, you will practice applying foundational concepts of security governance and risk management including:
Creating security strategies that align with a company’s goals and objectives.Applying risk assessment techniques to real-world situations.Implementing effective security education, training, and awareness programs.
Syllabus
Course 1: Security Governance & Compliance
- Offered by University of California, Irvine. Students are introduced to the field of cyber security with a focus on the domain of security & ... Enroll for free.
Course 2: Introduction to Risk Management
- Offered by University of California, Irvine. In this course, you will learn about risk assessment techniques and how to implement a number ... Enroll for free.
Course 3: Personnel & Third-Party Security
- Offered by University of California, Irvine. In this course, you will learn all about the process of implementing effective education, ... Enroll for free.
- Offered by University of California, Irvine. Students are introduced to the field of cyber security with a focus on the domain of security & ... Enroll for free.
Course 2: Introduction to Risk Management
- Offered by University of California, Irvine. In this course, you will learn about risk assessment techniques and how to implement a number ... Enroll for free.
Course 3: Personnel & Third-Party Security
- Offered by University of California, Irvine. In this course, you will learn all about the process of implementing effective education, ... Enroll for free.
Courses
-
In this course, you will learn all about the process of implementing effective education, training, and awareness programs. You will also study the role personnel security plays in protecting an organization’s assets, intellectual property, and physical assets. You will also be introduced to the steps required for effective Vendor Risk Management (VRM), including: due diligence, contracting, monitoring & accessing, and termination. Throughout the course, you will engage with current case studies that illustrate the key concepts in your lessons. You will also have the chance to submit assignments in which you will apply the material in a practical application.
-
Students are introduced to the field of cyber security with a focus on the domain of security & risk management. Topics include the fundamental concepts and goals of cybersecurity (the CIA triad), security governance design, the NIST cybersecurity framework, relevant laws and regulations, and the roles of policies, strategies, and procedures in cybersecurity governance.
-
In this course, you will learn about risk assessment techniques and how to implement a number of strategies that will ensure the protection of assets. You will learn about the relationship between assets, vulnerabilities, threats, and risks. You will also engage with a number of current case studies in the industry that illustrate the material. You will leave the course with skills relating to threat modeling and business continuity planning that have direct applications at your current job or in your future career.
Taught by
Jacob Horne and Qasim Ijaz