Herbert J. Mattord

Dr. Herbert Mattord teaches courses in Information Security and Assurance and Information Systems at Kennesaw State University in Kennesaw, GA. He is the Associate Director of the KSU Center for Information Security Education (infosec.kennesaw.edu), as well as the Assistant Chair of the Department of Information Systems. He completed 26 years of IT industry experience before becoming a full-time academic in 2002. His experiences as an application developer, database administrator, project manager, and information security practitioner are a valuable background to his teaching role at Kennesaw State University. While engaged in his IT career, he worked as an adjunct professor at Kennesaw State University in Kennesaw Georgia, Southern Polytechnic State University in Marietta, Georgia, Austin Community College in Austin, Texas, and Texas State University-San Marcos. He was formerly the Manager of Corporate Information Technology Security at Georgia-Pacific Corporation, where his practical knowledge of information security implementation and management was acquired. Herb is the co-author of a number textbooks with Dr. Michael Whitman and others, notably Principles of Information Security, and Management of Information Security. Herb completed his Ph.D. in Information Systems with a concentration in Information Security at Nova Southeastern University.

Sort options

Dominant Risk Management Standards and Frameworks (Coursera)

Organizations with little experience in risk management will want to look to national and international organizations for guidance in designing and implementing their risk management efforts. There are two dominant organizations that offer guidance in this area: the U.S. National Institute for Standards in Technology (NIST) and the [...]
No votes yet

Implementing a Risk Management Framework (Coursera)

The ultimate destination for a security manager is the Chief Information Security Officer (or Chief Security Officer) a senior executive role responsible for all cybersecurity operations in the organization. But how do you get from entry-level IT or security employee to the CISO’s office and what do you need [...]
No votes yet

A General Approach to Risk Management (Coursera)

Every organization uses its information to support its business operations. When there are threats in the internal and external environments, they create the risk of information loss or damage. This course examines the design and construction of a risk management program, including policies and plans, to support the [...]
No votes yet

Road to the CISO – Culminating Project Course (Coursera)

The ultimate destination for a security manager is the Chief Information Security Officer (or Chief Security Officer) a senior executive role responsible for all cybersecurity operations in the organization. But how do you get from entry-level IT or security employee to the CISO’s office and what do you need [...]
No votes yet

Managing Network Security (Coursera)

Almost every organization uses computer networks to share their information and to support their business operations. When we allow network access to data it is exposed to threats from inside and outside of the organization. This course examines the threats associated with using internal and external networks [...]
No votes yet

The GRC Approach to Managing Cybersecurity (Coursera)

Managing cybersecurity is about managing risk, specifically the risk to information assets of valued by an organization. This course examines the role of Governance, Risk Management, and Compliance (GRC) as part of the Cybersecurity management process, including key functions of planning, policies, and the administration of technologies to [...]
No votes yet

The Foundations of Cybersecurity (Coursera)

In order to manage the cybersecurity function business, you must first understand its language and its environment. This course covers the foundations of cybersecurity, including threats and vulnerabilities as well as the tools, technologies, and strategies used to manage it.
No votes yet

Managing Cybersecurity Incidents and Disasters (Coursera)

Most organizations plan for routine operations, but what happens when unexpected events overtake the routine? This course examines contingency planning used to prepare for and manage non-normal operations, including cybersecurity incidents – like hacking attempts, web site defacement, denial of service attacks, information disclosures; a well as other natural [...]
No votes yet

Cybersecurity and the X-Factor (Coursera)

What is the X-Factor? In Cybersecurity, the X-Factor related to unknown and unpredictable human behavior within and outside of your organization. “No one really knows why humans do what they do”, (David K. Reynolds), and because of this organizations can be unprepared for malicious, untrained, or even best intentioned [...]
Average: 10 (4 votes)

Cybersecurity Foundations for Risk Management (Coursera)

In order to manage the cybersecurity function business, you must first understand its language and its environment. This course covers the foundations of cybersecurity, including threats and vulnerabilities as well as the tools, technologies, and strategies used to manage it.
No votes yet