We may earn an affiliate commission when you visit our partners.
Aaron Rosenmund

An organization's commitment to enterprise cybersecurity underpins its ability to execute business operations. Learn how modern organizations leverage cybersecurity functions to protect their products, services, and bottom line.

Read more

An organization's commitment to enterprise cybersecurity underpins its ability to execute business operations. Learn how modern organizations leverage cybersecurity functions to protect their products, services, and bottom line.

This course explains how an organization's needs translate into enterprise security priorities. You first learn the tenets of secure engineering, architecture, and administration of products and networks. Then cover the continuous role of defensive and offensive security operations. Ending with governance, risk management and compliance, and ultimately how these functions work together to accomplish risk management and mitigation. All to prepare you to understand the importance and complexity of tasks required to keep up with the ever-changing landscape of threats and vulnerabilities.

Enroll now

Here's a deal for you

We found an offer that may be relevant to this course.
Save money when you learn. All coupon codes, vouchers, and discounts are applied automatically unless otherwise noted.

What's inside

Syllabus

Security Explained

Good to know

Know what's good
, what to watch for
, and possible dealbreakers
Builds a strong foundation for beginners in cybersecurity principles and practices
Teaches secure engineering, architecture, and administration of products and networks, which are core skills for cybersecurity professionals
Covers defensive and offensive security operations, which are essential for protecting against modern cyber threats
Examines governance, risk management, and compliance, which are critical for ensuring that cybersecurity measures are aligned with business objectives
Prepares learners to understand the importance and complexity of cybersecurity in the ever-changing landscape of threats and vulnerabilities
Taught by Aaron Rosenmund, who is recognized for his work in cybersecurity and risk management

Save this course

Save Security Explained to your list so you can find it easily later:
Save

Activities

Be better prepared before your course. Deepen your understanding during and after it. Supplement your coursework and achieve mastery of the topics covered in Security Explained with these activities:
Review Course Syllabus
Review the syllabus or course outline to get an overview of the topics covered in the course.
Show steps
  • Read and understand the syllabus
  • Identify key topics and concepts
  • Plan a study schedule
Compile a folder of course materials
Allows you to build a repository of information and notes for easy referencing during and after the course.
Show steps
  • Create a folder on your computer or on the cloud.
  • Label the folder with the name of the course, course number and section, the course instructor, and the semester. Example: "IT101-001 Cybersecurity in the Enterprise, Aaron Rosenmund, Fall 2023"
  • Download and save the course syllabus.
  • As the course progresses, download, print, and file readings, assignments, and quizzes.
Review Networking Fundamentals
Refreshes your existing knowledge of computer networking basics, ensuring you start the course with a strong understanding of the subject.
Browse courses on Networking Fundamentals
Show steps
  • Review concepts of IP addressing, subnetting, and routing.
  • Refresh your knowledge of network topologies and protocols.
  • Practice configuring basic network devices such as switches and routers.
Six other activities
Expand to see all activities and additional details
Show all nine activities
Organize and Review Course Materials
Helps you stay organized and engaged with the course materials, improving your retention and understanding of the subject matter.
Show steps
  • Create a dedicated folder or notebook for course materials.
  • Regularly review and summarize lecture notes, readings, and assignments.
  • Create flashcards or study guides to reinforce key concepts.
Follow Cybersecurity News
Follow cybersecurity news and blogs to stay up-to-date on the latest threats and trends.
Browse courses on Information Security
Show steps
  • Subscribe to cybersecurity news sources
  • Read articles and blog posts regularly
  • Discuss cybersecurity news with peers
Get Hands-on with Network Security Tools
Helps you gain practical experience with industry-standard network security tools, enhancing your ability to identify and mitigate vulnerabilities.
Browse courses on Network Security Tools
Show steps
  • Install and configure network security tools such as Wireshark and Nmap.
  • Practice using these tools to analyze network traffic and identify security issues.
  • Follow online tutorials to learn advanced techniques for network security analysis.
Practice Penetration Testing
Practice penetration testing skills through online platforms or virtual labs.
Browse courses on Penetration Testing
Show steps
  • Set up a penetration testing lab
  • Conduct vulnerability assessments and exploit systems
  • Write penetration testing reports
Develop a Network Security Policy
Challenges you to think critically about network security best practices and create a comprehensive policy document that reflects your understanding of the subject.
Show steps
  • Research industry standards and best practices for network security.
  • Identify potential vulnerabilities and threats to your network.
  • Develop a set of security controls and procedures to mitigate these risks.
  • Document your policy in a clear and concise manner.
Design and Implement a Secure Network Infrastructure
Provides you with hands-on experience in designing and implementing a secure network infrastructure, allowing you to apply the concepts learned in the course.
Show steps
  • Gather requirements and design a network architecture that meets security best practices.
  • Select and configure network security devices such as firewalls, IDS/IPS, and VPNs.
  • Implement network monitoring and logging systems to detect and respond to security incidents.
  • Test and evaluate the effectiveness of your security measures.

Career center

Learners who complete Security Explained will develop knowledge and skills that may be useful to these careers:
Application Security Engineer
Application Security Engineers design, implement, and manage an organization's application security. They may also do risk management. This course explains how an organization's needs translate into enterprise security priorities. You may learn the tenets of secure engineering, architecture, and administration of products and networks. This course may be useful for this role.
Security Architect
Security Architects design and manage an organization's security architecture. They may also do risk management. This course explains how an organization's needs translate into enterprise security priorities. You may learn the tenets of secure engineering, architecture, and administration of products and networks. This course may be useful for this role.
Security Manager
Security Managers manage an organization's security program. They may also do risk management. This course explains how an organization's needs translate into enterprise security priorities. You may learn the tenets of secure engineering, architecture, and administration of products and networks. This course may be useful for this role.
IT Security Engineer
IT Security Engineers design, implement, and manage an organization's IT security. They may also do risk management. This course explains how an organization's needs translate into enterprise security priorities. You may learn the tenets of secure engineering, architecture, and administration of products and networks. This course may be useful for this role.
Information Security Analyst
Information Security Analysts monitor and investigate security events. They may also do risk management. This course explains how an organization's needs translate into enterprise security priorities. You may learn the tenets of secure engineering, architecture, and administration of products and networks. This course may be useful for this role.
Security Analyst
Security Analysts monitor and investigate security events. They may also do risk management. This course explains how an organization's needs translate into enterprise security priorities. You may learn the tenets of secure engineering, architecture, and administration of products and networks. This course may be useful for this role.
Cybersecurity Analyst
Cybersecurity Analysts monitor and investigate security events. They may also do risk management. This course explains how an organization's needs translate into enterprise security priorities. You may learn the tenets of secure engineering, architecture, and administration of products and networks. This course may be useful for this role.
Network Security Engineer
Network Security Engineers design, implement, and manage an organization's network security. They may also do risk management. This course explains how an organization's needs translate into enterprise security priorities. You may learn the tenets of secure engineering, architecture, and administration of products and networks. This course may be useful for this role.
Cybersecurity Engineer
Cybersecurity Engineers design, implement, and manage an organization's cybersecurity. They may also do risk management. This course explains how an organization's needs translate into enterprise security priorities. You may learn the tenets of secure engineering, architecture, and administration of products and networks. This course may be useful for this role.
Cloud Security Engineer
Cloud Security Engineers design, implement, and manage an organization's cloud security. They may also do risk management. This course explains how an organization's needs translate into enterprise security priorities. You may learn the tenets of secure engineering, architecture, and administration of products and networks. This course may be useful for this role.
Information Security Manager
Information Security Managers manage an organization's information security program. They may also do risk management. This course explains how an organization's needs translate into enterprise security priorities. You may learn the tenets of secure engineering, architecture, and administration of products and networks. This course may be useful for this role.
Risk Analyst
Risk Analysts identify and assess risks to an organization. They may also develop and implement risk management plans. This course explains how an organization's needs translate into enterprise security priorities. You may learn the tenets of secure engineering, architecture, and administration of products and networks. This course may be helpful for this role.
Security Consultant
Security Consultants provide security advice and guidance to organizations. They may also help organizations develop and implement security programs. This course explains how an organization's needs translate into enterprise security priorities. You may learn the tenets of secure engineering, architecture, and administration of products and networks. This course may be useful for this role.
Incident Responder
Incident Responders investigate and respond to security incidents. They may also develop and implement incident response plans. This course explains how an organization's needs translate into enterprise security priorities. You may learn the tenets of secure engineering, architecture, and administration of products and networks. This course may be useful for this role.
Security Researcher
Security Researchers identify and analyze security vulnerabilities. They may also develop and implement security solutions. This course explains how an organization's needs translate into enterprise security priorities. You may learn the tenets of secure engineering, architecture, and administration of products and networks. This course may be useful for this role.

Reading list

We've selected 18 books that we think will supplement your learning. Use these to develop background knowledge, enrich your coursework, and gain a deeper understanding of the topics covered in Security Explained.
Provides a comprehensive overview of security engineering principles and best practices, covering topics such as threat modeling, risk assessment, and secure software development. It valuable resource for anyone interested in developing secure and reliable systems.
Covers the principles of computer forensics and can be used to supplement the course content on defensive and offensive security operations. It can also serve as additional background reading for the course.
Provides a comprehensive overview of cryptography and network security, covering topics such as encryption, authentication, and digital signatures. It valuable resource for anyone interested in understanding the fundamentals of cryptography and network security.
Provides a practical guide to ethical hacking and penetration testing, covering topics such as vulnerability assessment, exploitation, and reporting. It valuable resource for anyone interested in pursuing a career in cybersecurity.
Provides a comprehensive overview of computer security, covering topics such as cryptography, network security, and operating system security. It valuable resource for anyone interested in understanding the fundamentals of computer security.
Provides a comprehensive overview of network security, covering topics such as network protocols, encryption, and firewalls. It valuable resource for anyone interested in understanding the fundamentals of network security.
Provides a comprehensive overview of information security, covering topics such as risk management, security controls, and incident response. It valuable resource for anyone interested in understanding the fundamentals of information security.
Covers the principles of network security monitoring and can be used to supplement the course content on defensive and offensive security operations. It can also serve as additional background reading to prepare for the course.
Provides a comprehensive overview of cloud security, covering topics such as cloud architecture, security controls, and compliance. It valuable resource for anyone interested in developing and implementing secure cloud environments.
Provides a practical guide to risk management for information security, covering topics such as risk assessment, risk mitigation, and risk monitoring. It valuable resource for anyone interested in developing and implementing effective cybersecurity risk management programs.
Provides a practical guide to web application hacking, covering topics such as SQL injection, cross-site scripting, and session hijacking. It valuable resource for anyone interested in learning about the art of web application hacking.
Covers the principles of risk management and control and can be used to supplement the course content on governance, risk management, and compliance. It can also serve as additional background reading to prepare for the course.
Covers the principles of security risk assessment and can be used to supplement the course content on governance, risk management, and compliance. It can also serve as additional background reading to prepare for the course.
Provides a practical guide to hacking techniques and tools, covering topics such as vulnerability assessment, penetration testing, and malware analysis. It valuable resource for anyone interested in learning about the art of hacking.
Covers the principles of software security testing and can be used to supplement the course content on secure engineering, architecture, and administration of products and networks, as it pertains to software products and services. It can also serve as additional background reading to prepare for the course.
Covers the fundamentals of network security and can be used to supplement the course content on secure network architecture and administration. It can also serve as additional background reading to prepare for the course.
Provides a comprehensive overview of network security, covering topics such as network protocols, encryption, and firewalls. It valuable resource for anyone interested in understanding the fundamentals of network security.

Share

Help others find this course page by sharing it with your friends and followers:

Similar courses

Here are nine courses similar to Security Explained.
Enterprise Security: Executive Briefing
Most relevant
Automated Cyber Security Incident Response
Most relevant
Cybersecurity for Everyone
Most relevant
A Strategic Approach to Cybersecurity
Most relevant
Customer-Centric Enterprise: Scale Product Lifecycle...
Most relevant
Risk Management for Cybersecurity and IT Managers
Most relevant
Configure SIEM Security Operation using Microsoft Sentinel
Most relevant
Play It Safe: Manage Security Risks
Most relevant
NIST CSF
Most relevant
Our mission

OpenCourser helps millions of learners each year. People visit us to learn workspace skills, ace their exams, and nurture their curiosity.

Our extensive catalog contains over 50,000 courses and twice as many books. Browse by search, by topic, or even by career interests. We'll match you to the right resources quickly.

Find this site helpful? Tell a friend about us.

Affiliate disclosure

We're supported by our community of learners. When you purchase or subscribe to courses and programs or purchase books, we may earn a commission from our partners.

Your purchases help us maintain our catalog and keep our servers humming without ads.

Thank you for supporting OpenCourser.

© 2016 - 2024 OpenCourser