YoVDO

Road to the CISO – Culminating Project Course

Offered By: University System of Georgia via Coursera

Tags

Cybersecurity Courses Risk Management Courses

Course Description

Overview

The ultimate destination for a security manager is the Chief Information Security Officer (or Chief Security Officer) a senior executive role responsible for all cybersecurity operations in the organization. But how do you get from entry-level IT or security employee to the CISO’s office and what do you need to know when you get there? This course examines the career path and requirements to be an effective CISO, as well as the roles and responsibilities of the position. In this course, a learner will be able to: ● Identify the career development and path of a Cybersecurity professional from entry-level to CISO ● Define and describe the role and function of a CISO in planning for cybersecurity ● Identify the development of a cybersecurity governance program and the role the CISO would play in it ● Discuss the strategic responsibilities of the CISO in overseeing an organization’s cybersecurity program

Syllabus

  • Introduction to The Culminating Project (Capstone Course)
    • Learning objectives for the capstone project.
  • Case Project Assignment 1 of 5
    • Prepare and submit a case-based presentation to deliver the results of a proposal to improve the staffing of the case organization's cybersecurity team.
  • Case Project Assignment 2 of 5
    • Prepare and submit a case-based presentation that delivers the results of your proposal to establish a risk management program.
  • Case Project Assignment 3 of 5
    • Prepare and submit a case-based presentation to deliver the results of a proposal to improve the cybersecurity policy portfolio of the organization.
  • Case Project Assignment 4 of 5
    • In this module, you will prepare and submit your case-based presentations to deliver the results of your proposal to establish a contingency planning program.
  • Case Project Assignment 5 of 5
    • Prepare and submit a case-based presentation that delivers the results of your proposal to establish a Cybersecurity Governance program.

Taught by

Herbert J. Mattord, Ph.D., CISM, CISSP, CDP and Michael Whitman, Ph.D., CISM, CISSP

Tags

Related Courses

Computer Security
Stanford University via Coursera
Cryptography II
Stanford University via Coursera
Malicious Software and its Underground Economy: Two Sides to Every Story
University of London International Programmes via Coursera
Building an Information Risk Management Toolkit
University of Washington via Coursera
Introduction to Cybersecurity
National Cybersecurity Institute at Excelsior College via Canvas Network