YoVDO

Cybersecurity Risk Management Frameworks

Offered By: University System of Georgia via Coursera

Tags

Cybersecurity Courses Risk Management Courses

Course Description

Overview

In this specialization, you will learn how to define Cybersecurity risk and discuss the threats that create it while you also learn to describe the role of Cybersecurity management in the management of Cybersecurity risk. You will go on to understand the elements of a general risk management framework as well as how to develop and administer a risk management effort. Along the way you will learn about the dominant standards and frameworks in risk management, and the tools used to support them.

Syllabus

Course 1: Cybersecurity Foundations for Risk Management
- Offered by Kennesaw State University. In order to manage the cybersecurity function business, you must first understand its language and its ... Enroll for free.

Course 2: A General Approach to Risk Management
- Offered by Kennesaw State University. Every organization uses its information to support its business operations. When there are threats in ... Enroll for free.

Course 3: Dominant Risk Management Standards and Frameworks
- Offered by Kennesaw State University. Organizations with little experience in risk management will want to look to national and ... Enroll for free.

Course 4: Implementing a Risk Management Framework
- Offered by Kennesaw State University. The ultimate destination for a security manager is the Chief Information Security Officer (or Chief ... Enroll for free.


Courses

  • 0 reviews

    7 hours 40 minutes

    View details
    In order to manage the cybersecurity function business, you must first understand its language and its environment. This course covers the foundations of cybersecurity, including threats and vulnerabilities as well as the tools, technologies, and strategies used to manage it. After completing this course, a learner will be able to: ● Define key concepts and terminology in Cybersecurity ● Identify threats to cybersecurity ● Identify strategies to identify and remediate vulnerabilities in information assets ● Identify the systemic components (including personnel) necessary for an effective cybersecurity program
  • 0 reviews

    8 hours 9 minutes

    View details
    Every organization uses its information to support its business operations. When there are threats in the internal and external environments, they create the risk of information loss or damage. This course examines the design and construction of a risk management program, including policies and plans, to support the identification and treatment of risk to the organization’s information assets.
  • 0 reviews

    18 hours 21 minutes

    View details
    The ultimate destination for a security manager is the Chief Information Security Officer (or Chief Security Officer) a senior executive role responsible for all cybersecurity operations in the organization. But how do you get from entry-level IT or security employee to the CISO’s office and what do you need to know when you get there? This course examines the career path and requirements to be an effective CISO, as well as the roles and responsibilities of the position. In this course, a learner will be able to: ● Identify the career development and path of a Cybersecurity professional from entry-level to CISO ● Define and describe the role and function of a CISO in planning for cybersecurity ● Identify the development of a cybersecurity governance program and the role the CISO would play in it ● Discuss the strategic responsibilities of the CISO in overseeing an organization’s cybersecurity program
  • 0 reviews

    8 hours 8 minutes

    View details
    Organizations with little experience in risk management will want to look to national and international organizations for guidance in designing and implementing their risk management efforts. There are two dominant organizations that offer guidance in this area: the U.S. National Institute for Standards in Technology (NIST) and the International Standards Organization. This course examines the risk management frameworks and standards offered by these organization and then discusses other available approaches. The course concludes with a discussion of applications and tools to support the organization’s risk management effort.

Taught by

Herbert J. Mattord, Ph.D., CISM, CISSP, CDP and Michael Whitman, Ph.D., CISM, CISSP

Tags

Related Courses

Computer Security
Stanford University via Coursera
Cryptography II
Stanford University via Coursera
Malicious Software and its Underground Economy: Two Sides to Every Story
University of London International Programmes via Coursera
Building an Information Risk Management Toolkit
University of Washington via Coursera
Introduction to Cybersecurity
National Cybersecurity Institute at Excelsior College via Canvas Network