We may earn an affiliate commission when you visit our partners.
Course image
Michael Whitman, Ph.D., CISM, CISSP and Herbert J. Mattord, Ph.D., CISM, CISSP, CDP

This specialization is intended for those learners that:

- would preferably have an undergraduate (bachelors) degree, or is a currently enrolled student

Read more

This specialization is intended for those learners that:

- would preferably have an undergraduate (bachelors) degree, or is a currently enrolled student

- are interested in the area of IT and cybersecurity and how it relates to business decisions

- is currently employed or seeking employment and needs to understand issues and best practices around Cybersecurity

- may be a IT or Cybersecurity professional or technician

- may be interested in Cybersecurity and unsure of how to approach a career in it

Enroll now

Share

Help others find Specialization from Coursera by sharing it with your friends and followers:

What's inside

Five courses

The Foundations of Cybersecurity

(0 hours)
In order to manage cybersecurity, you must first understand its language and environment. This course covers the foundations, including threats and vulnerabilities as well as the tools, technologies, and strategies used to manage it.

The GRC Approach to Managing Cybersecurity

(0 hours)
Managing cybersecurity involves managing risk, particularly to information assets valued by an organization. This course explores the role of Governance, Risk Management, and Compliance (GRC) in Cybersecurity management, including planning, policies, and technology administration to protect critical information assets.

Managing Network Security

(0 hours)
Almost every organization uses computer networks to share information and support business operations. When we allow network access to data, it is exposed to threats from inside and outside of the organization. This course examines the threats associated with using internal and external networks and how to manage the protection of information when it’s accessible via networks. In this course, a learner will be able to:

Managing Cybersecurity Incidents and Disasters

(0 hours)
Most organizations plan for routine operations, but what happens when unexpected events overtake the routine? This course examines contingency planning used to prepare for and manage non-normal operations, including cybersecurity incidents and disasters.

Road to the CISO – Culminating Project Course

(4 hours)
The ultimate destination for a security manager is the Chief Information Security Officer (CISO), a senior executive role responsible for cybersecurity operations. This course examines the career path and requirements to be an effective CISO, as well as the roles and responsibilities of the position.

Learning objectives

  • Understand that cybersecurity is a managerial problem.
  • Identify and manage risks to information assets within organizations.
  • Develop cybersecurity policies and plans for organizations.
  • Explain the integration of cybersecurity into all aspects of a business’s operations and use of information assets.

Save this collection

Save Managing Cybersecurity to your list so you can find it easily later:
Save
Our mission

OpenCourser helps millions of learners each year. People visit us to learn workspace skills, ace their exams, and nurture their curiosity.

Our extensive catalog contains over 50,000 courses and twice as many books. Browse by search, by topic, or even by career interests. We'll match you to the right resources quickly.

Find this site helpful? Tell a friend about us.

Affiliate disclosure

We're supported by our community of learners. When you purchase or subscribe to courses and programs or purchase books, we may earn a commission from our partners.

Your purchases help us maintain our catalog and keep our servers humming without ads.

Thank you for supporting OpenCourser.

© 2016 - 2024 OpenCourser