This specialization is intended for those learners that:
- would preferably have an undergraduate (bachelors) degree, or is a currently enrolled student
- are interested in the area of IT and cybersecurity and how it relates to business decisions
- is currently employed or seeking employment and needs to understand issues and best practices around Cybersecurity
- may be a IT or Cybersecurity professional or technician
- may be interested in Cybersecurity and unsure of how to approach a career in it
WHAT YOU WILL LEARN
- Understand that cybersecurity is a managerial problem.
- Identify and manage risks to information assets within organizations.
- Develop cybersecurity policies and plans for organizations.
- Explain the integration of cybersecurity into all aspects of a business’s operations and use of information assets.
The ultimate destination for a security manager is the Chief Information Security Officer (or Chief Security Officer) a senior executive role responsible for all cybersecurity operations in the organization. But how do you get from entry-level IT or security employee to the CISO’s office and what do you need [...]
Almost every organization uses computer networks to share their information and to support their business operations. When we allow network access to data it is exposed to threats from inside and outside of the organization. This course examines the threats associated with using internal and external networks [...]
Managing cybersecurity is about managing risk, specifically the risk to information assets of valued by an organization. This course examines the role of Governance, Risk Management, and Compliance (GRC) as part of the Cybersecurity management process, including key functions of planning, policies, and the administration of technologies to [...]
In order to manage the cybersecurity function business, you must first understand its language and its environment. This course covers the foundations of cybersecurity, including threats and vulnerabilities as well as the tools, technologies, and strategies used to manage it.
Most organizations plan for routine operations, but what happens when unexpected events overtake the routine? This course examines contingency planning used to prepare for and manage non-normal operations, including cybersecurity incidents – like hacking attempts, web site defacement, denial of service attacks, information disclosures; a well as other natural [...]