Herbert J. Mattord

Dr. Herbert Mattord teaches courses in Information Security and Assurance and Information Systems at Kennesaw State University in Kennesaw, GA. He is the Associate Director of the KSU Center for Information Security Education (infosec.kennesaw.edu), as well as the Assistant Chair of the Department of Information Systems. He completed 26 years of IT industry experience before becoming a full-time academic in 2002. His experiences as an application developer, database administrator, project manager, and information security practitioner are a valuable background to his teaching role at Kennesaw State University. While engaged in his IT career, he worked as an adjunct professor at Kennesaw State University in Kennesaw Georgia, Southern Polytechnic State University in Marietta, Georgia, Austin Community College in Austin, Texas, and Texas State University-San Marcos. He was formerly the Manager of Corporate Information Technology Security at Georgia-Pacific Corporation, where his practical knowledge of information security implementation and management was acquired. Herb is the co-author of a number textbooks with Dr. Michael Whitman and others, notably Principles of Information Security, and Management of Information Security. Herb completed his Ph.D. in Information Systems with a concentration in Information Security at Nova Southeastern University.

Sort options

Cybersecurity Foundations for Risk Management (Coursera)

In order to manage the cybersecurity function business, you must first understand its language and its environment. This course covers the foundations of cybersecurity, including threats and vulnerabilities as well as the tools, technologies, and strategies used to manage it.

Cybersecurity Job Search and Interviews: Getting Started (Coursera)

Are you planning to have a career in cybersecurity? This course can help you plan your preparation for such a career as well as give some advice on finding positions and landing a position. What you will learn: the process and resources for finding the perfect cybersecurity job; the [...]

Cybersecurity and the Internet of Things (Coursera)

Welcome to “Cybersecurity and the Internet of Things”! This course is for you if you are curious about the most recent trends and activities in the internet capabilities and concerns about programmed devices. There are complexities and areas of necessary awareness when the industrial sector becomes connected to your [...]

Dominant Risk Management Standards and Frameworks (Coursera)

Organizations with little experience in risk management will want to look to national and international organizations for guidance in designing and implementing their risk management efforts. There are two dominant organizations that offer guidance in this area: the U.S. National Institute for Standards in Technology (NIST) and the [...]

Implementing a Risk Management Framework (Coursera)

The ultimate destination for a security manager is the Chief Information Security Officer (or Chief Security Officer) a senior executive role responsible for all cybersecurity operations in the organization. But how do you get from entry-level IT or security employee to the CISO’s office and what do you need [...]

A General Approach to Risk Management (Coursera)

Every organization uses its information to support its business operations. When there are threats in the internal and external environments, they create the risk of information loss or damage. This course examines the design and construction of a risk management program, including policies and plans, to support the [...]

Road to the CISO – Culminating Project Course (Coursera)

The ultimate destination for a security manager is the Chief Information Security Officer (or Chief Security Officer) a senior executive role responsible for all cybersecurity operations in the organization. But how do you get from entry-level IT or security employee to the CISO’s office and what do you need [...]

Managing Network Security (Coursera)

Almost every organization uses computer networks to share their information and to support their business operations. When we allow network access to data it is exposed to threats from inside and outside of the organization. This course examines the threats associated with using internal and external networks [...]

The GRC Approach to Managing Cybersecurity (Coursera)

Managing cybersecurity is about managing risk, specifically the risk to information assets of valued by an organization. This course examines the role of Governance, Risk Management, and Compliance (GRC) as part of the Cybersecurity management process, including key functions of planning, policies, and the administration of technologies to [...]

The Foundations of Cybersecurity (Coursera)

In order to manage the cybersecurity function business, you must first understand its language and its environment. This course covers the foundations of cybersecurity, including threats and vulnerabilities as well as the tools, technologies, and strategies used to manage it.