Security Principles (Coursera)

Security Principles (Coursera)
Course Auditing
Categories
Effort
Certification
Languages
No prior experience required.
Misc

MOOC List is learner-supported. When you buy through links on our site, we may earn an affiliate commission.

Security Principles (Coursera)
Welcome to course 1 of 5 of this Specialization, Security Principles. After completing this course, the participant will be able to discuss the foundational concepts of cybersecurity principles: recognize foundational security concepts of information assurance; define risk management terminology and summarize the process; relate risk management to personal or professional practices; classify types of security controls; distinguish between policies, procedures, standards, regulations and laws; demonstrate the relationship among governance elements; analyze appropriate outcomes according to the canons of the (ISC)2 Code of Ethics when given examples; practice the terminology and review security principles.

MOOC List is learner-supported. When you buy through links on our site, we may earn an affiliate commission.

Agenda

Course Introduction

Module 1: Information Assurance

Module 2: Risk Management Process

Module 3: Security Controls

Module 4: Governance

Module 5: (ISC)2 Code of Ethics

Module 6: Course Summary

This training is for IT professionals, career changers, college students, recent college graduates, advanced high school students and recent high school graduates looking to start their path toward cybersecurity leadership by taking the Certified in Cybersecurity entry-level exam.

There are no prerequisites to take the training or the exam. It is recommended that candidates have basic Information Technology (IT) knowledge. No work experience in cybersecurity or formal education diploma/degree is required.


Course 1 of 5 in the Certified in Cybersecurity Specialization.


Syllabus


WEEK 1

Course Introduction

After completing this chapter, the participant will be able to:  Discuss the foundational concepts of cybersecurity principles. Recognize foundational security concepts of information assurance. Define risk management terminology and summarize the process. Relate risk management to personal or professional practices. Classify types of security controls. Distinguish between policies, procedures, standards, regulations and laws. Demonstrate the relationship among governance elements. Analyze appropriate outcomes according to the canons of the (ISC)2 Code of Ethics when given examples. Practice the terminology and review security principles.


WEEK 2

Information Assurance

Throughout this module, we will focus on Information Assurance.


WEEK 3

Risk Mitigation Process

Throughout this module, we will focus on the Risk Mitigation Process.


WEEK 4

Security Controls

Throughout this module, we will focus on Security Controls.


WEEK 5

Governance

Throughout this module, we will focus on Governance.


WEEK 6

(ISC)² Code of Ethics

Throughout this module, we will focus on the (ISC)² Code of Ethics.


WEEK 7

Security Principles Review

This module will test your knowledge on what you have learned throughout this course.



MOOC List is learner-supported. When you buy through links on our site, we may earn an affiliate commission.

Course Auditing
46.00 EUR/month
No prior experience required.

MOOC List is learner-supported. When you buy through links on our site, we may earn an affiliate commission.