We may earn an affiliate commission when you visit our partners.
Pluralsight logo

Security Explained

Aaron Rosenmund

An organization's commitment to enterprise cybersecurity underpins its ability to execute business operations. Learn how modern organizations leverage cybersecurity functions to protect their products, services, and bottom line.

Read more

An organization's commitment to enterprise cybersecurity underpins its ability to execute business operations. Learn how modern organizations leverage cybersecurity functions to protect their products, services, and bottom line.

This course explains how an organization's needs translate into enterprise security priorities. You first learn the tenets of secure engineering, architecture, and administration of products and networks. Then cover the continuous role of defensive and offensive security operations. Ending with governance, risk management and compliance, and ultimately how these functions work together to accomplish risk management and mitigation. All to prepare you to understand the importance and complexity of tasks required to keep up with the ever-changing landscape of threats and vulnerabilities.

Enroll now

What's inside

Syllabus

Security Explained

Good to know

Know what's good
, what to watch for
, and possible dealbreakers
Builds a strong foundation for beginners in cybersecurity principles and practices
Teaches secure engineering, architecture, and administration of products and networks, which are core skills for cybersecurity professionals
Covers defensive and offensive security operations, which are essential for protecting against modern cyber threats
Examines governance, risk management, and compliance, which are critical for ensuring that cybersecurity measures are aligned with business objectives
Prepares learners to understand the importance and complexity of cybersecurity in the ever-changing landscape of threats and vulnerabilities
Taught by Aaron Rosenmund, who is recognized for his work in cybersecurity and risk management

Save this course

Save Security Explained to your list so you can find it easily later:
Save

Activities

Coming soon We're preparing activities for Security Explained. These are activities you can do either before, during, or after a course.

Career center

Learners who complete Security Explained will develop knowledge and skills that may be useful to these careers:
Application Security Engineer
Application Security Engineers design, implement, and manage an organization's application security. They may also do risk management. This course explains how an organization's needs translate into enterprise security priorities. You may learn the tenets of secure engineering, architecture, and administration of products and networks. This course may be useful for this role.
Security Architect
Security Architects design and manage an organization's security architecture. They may also do risk management. This course explains how an organization's needs translate into enterprise security priorities. You may learn the tenets of secure engineering, architecture, and administration of products and networks. This course may be useful for this role.
Security Manager
Security Managers manage an organization's security program. They may also do risk management. This course explains how an organization's needs translate into enterprise security priorities. You may learn the tenets of secure engineering, architecture, and administration of products and networks. This course may be useful for this role.
IT Security Engineer
IT Security Engineers design, implement, and manage an organization's IT security. They may also do risk management. This course explains how an organization's needs translate into enterprise security priorities. You may learn the tenets of secure engineering, architecture, and administration of products and networks. This course may be useful for this role.
Information Security Analyst
Information Security Analysts monitor and investigate security events. They may also do risk management. This course explains how an organization's needs translate into enterprise security priorities. You may learn the tenets of secure engineering, architecture, and administration of products and networks. This course may be useful for this role.
Security Analyst
Security Analysts monitor and investigate security events. They may also do risk management. This course explains how an organization's needs translate into enterprise security priorities. You may learn the tenets of secure engineering, architecture, and administration of products and networks. This course may be useful for this role.
Cybersecurity Analyst
Cybersecurity Analysts monitor and investigate security events. They may also do risk management. This course explains how an organization's needs translate into enterprise security priorities. You may learn the tenets of secure engineering, architecture, and administration of products and networks. This course may be useful for this role.
Network Security Engineer
Network Security Engineers design, implement, and manage an organization's network security. They may also do risk management. This course explains how an organization's needs translate into enterprise security priorities. You may learn the tenets of secure engineering, architecture, and administration of products and networks. This course may be useful for this role.
Cybersecurity Engineer
Cybersecurity Engineers design, implement, and manage an organization's cybersecurity. They may also do risk management. This course explains how an organization's needs translate into enterprise security priorities. You may learn the tenets of secure engineering, architecture, and administration of products and networks. This course may be useful for this role.
Cloud Security Engineer
Cloud Security Engineers design, implement, and manage an organization's cloud security. They may also do risk management. This course explains how an organization's needs translate into enterprise security priorities. You may learn the tenets of secure engineering, architecture, and administration of products and networks. This course may be useful for this role.
Information Security Manager
Information Security Managers manage an organization's information security program. They may also do risk management. This course explains how an organization's needs translate into enterprise security priorities. You may learn the tenets of secure engineering, architecture, and administration of products and networks. This course may be useful for this role.
Risk Analyst
Risk Analysts identify and assess risks to an organization. They may also develop and implement risk management plans. This course explains how an organization's needs translate into enterprise security priorities. You may learn the tenets of secure engineering, architecture, and administration of products and networks. This course may be helpful for this role.
Security Consultant
Security Consultants provide security advice and guidance to organizations. They may also help organizations develop and implement security programs. This course explains how an organization's needs translate into enterprise security priorities. You may learn the tenets of secure engineering, architecture, and administration of products and networks. This course may be useful for this role.
Incident Responder
Incident Responders investigate and respond to security incidents. They may also develop and implement incident response plans. This course explains how an organization's needs translate into enterprise security priorities. You may learn the tenets of secure engineering, architecture, and administration of products and networks. This course may be useful for this role.
Security Researcher
Security Researchers identify and analyze security vulnerabilities. They may also develop and implement security solutions. This course explains how an organization's needs translate into enterprise security priorities. You may learn the tenets of secure engineering, architecture, and administration of products and networks. This course may be useful for this role.

Reading list

We've selected 18 books that we think will supplement your learning. Use these to develop background knowledge, enrich your coursework, and gain a deeper understanding of the topics covered in Security Explained.
Provides a comprehensive overview of security engineering principles and best practices, covering topics such as threat modeling, risk assessment, and secure software development. It valuable resource for anyone interested in developing secure and reliable systems.
Covers the principles of computer forensics and can be used to supplement the course content on defensive and offensive security operations. It can also serve as additional background reading for the course.
Provides a comprehensive overview of cryptography and network security, covering topics such as encryption, authentication, and digital signatures. It valuable resource for anyone interested in understanding the fundamentals of cryptography and network security.
Provides a practical guide to ethical hacking and penetration testing, covering topics such as vulnerability assessment, exploitation, and reporting. It valuable resource for anyone interested in pursuing a career in cybersecurity.
Provides a comprehensive overview of computer security, covering topics such as cryptography, network security, and operating system security. It valuable resource for anyone interested in understanding the fundamentals of computer security.
Provides a comprehensive overview of network security, covering topics such as network protocols, encryption, and firewalls. It valuable resource for anyone interested in understanding the fundamentals of network security.
Provides a comprehensive overview of information security, covering topics such as risk management, security controls, and incident response. It valuable resource for anyone interested in understanding the fundamentals of information security.
Covers the principles of network security monitoring and can be used to supplement the course content on defensive and offensive security operations. It can also serve as additional background reading to prepare for the course.
Provides a comprehensive overview of cloud security, covering topics such as cloud architecture, security controls, and compliance. It valuable resource for anyone interested in developing and implementing secure cloud environments.
Provides a practical guide to risk management for information security, covering topics such as risk assessment, risk mitigation, and risk monitoring. It valuable resource for anyone interested in developing and implementing effective cybersecurity risk management programs.
Provides a practical guide to web application hacking, covering topics such as SQL injection, cross-site scripting, and session hijacking. It valuable resource for anyone interested in learning about the art of web application hacking.
Covers the principles of risk management and control and can be used to supplement the course content on governance, risk management, and compliance. It can also serve as additional background reading to prepare for the course.
Covers the principles of security risk assessment and can be used to supplement the course content on governance, risk management, and compliance. It can also serve as additional background reading to prepare for the course.
Provides a practical guide to hacking techniques and tools, covering topics such as vulnerability assessment, penetration testing, and malware analysis. It valuable resource for anyone interested in learning about the art of hacking.
Covers the principles of software security testing and can be used to supplement the course content on secure engineering, architecture, and administration of products and networks, as it pertains to software products and services. It can also serve as additional background reading to prepare for the course.
Covers the fundamentals of network security and can be used to supplement the course content on secure network architecture and administration. It can also serve as additional background reading to prepare for the course.
Provides a comprehensive overview of network security, covering topics such as network protocols, encryption, and firewalls. It valuable resource for anyone interested in understanding the fundamentals of network security.

Share

Help others find this course page by sharing it with your friends and followers:

Similar courses

Here are nine courses similar to Security Explained.
Enterprise Security: Executive Briefing
Most relevant
Automated Cyber Security Incident Response
Most relevant
Cybersecurity for Everyone
Most relevant
A Strategic Approach to Cybersecurity
Most relevant
Customer-Centric Enterprise: Scale Product Lifecycle...
Most relevant
Risk Management for Cybersecurity and IT Managers
Most relevant
Configure SIEM Security Operation using Microsoft Sentinel
Most relevant
Play It Safe: Manage Security Risks
Most relevant
NIST CSF
Most relevant
Our mission

OpenCourser helps millions of learners each year. People visit us to learn workspace skills, ace their exams, and nurture their curiosity.

Our extensive catalog contains over 50,000 courses and twice as many books. Browse by search, by topic, or even by career interests. We'll match you to the right resources quickly.

Find this site helpful? Tell a friend about us.

Affiliate disclosure

We're supported by our community of learners. When you purchase or subscribe to courses and programs or purchase books, we may earn a commission from our partners.

Your purchases help us maintain our catalog and keep our servers humming without ads.

Thank you for supporting OpenCourser.

© 2016 - 2024 OpenCourser