We may earn an affiliate commission when you visit our partners.
Course image
Andrew Dwyer

In this course you will look at some of the key components of practical cyber security management and its governance. This includes what happens when things go wrong, understanding how organisations can respond to incidents, through to the essential role of people in achieving better cyber security outcomes. Together, you will examine how incident management, cyber resilience, and developing an effective appreciation of people, not simply as users but as active participants, can enable better cyber security outcomes.

Read more

In this course you will look at some of the key components of practical cyber security management and its governance. This includes what happens when things go wrong, understanding how organisations can respond to incidents, through to the essential role of people in achieving better cyber security outcomes. Together, you will examine how incident management, cyber resilience, and developing an effective appreciation of people, not simply as users but as active participants, can enable better cyber security outcomes.

The topics covered include:

• Identifying what an incident is

• Incident preparation, planning, and response

• Cyber resilience

• The role of people in security management

• The building of trust and developing positive cyber security cultures

By completing this course, you will learn how to integrate incident management and a rich knowledge of people into a real-world Information Security Management System for an organisation.

Enroll now

What's inside

Syllabus

Introduction to Security Management and Governance
In the first week, we will obtain an overview of the course and, in particular, get an overview how security management can be used to address and respond to security incidents through a range of techniques. This includes engaging with ISO/IEC 27035 to develop a pragmatic response to risk management.
Read more
Dealing with Incidents
This week you will learn how to identify and prioritise incidents, their planning and preparation, responding to incidents as well as learning and assessing from (inevitable) incidents that organisations encounter.
People and cyber security
This week is concerned about the integration of different people and communities into security management.
A Trusting Ecosystem
In this week you will learn about a range of components ranging from trust to security awareness training to demonstrate why the management of people is a core element to a successful information security management system. The week concludes by asking what people-centric security might enable for an organisation and how such a change of perspective can be beneficial to security management.

Good to know

Know what's good
, what to watch for
, and possible dealbreakers
Covers topics essential for cyber security management, such as incident response, cyber resilience, and the role of people
Taught by an instructor with extensive experience in cyber security management
Incorporates real-world case studies and examples to illustrate key concepts
Provides hands-on exercises and activities to reinforce learning
Suitable for individuals seeking to enhance their knowledge and skills in cyber security management

Save this course

Save Security Management and Governance to your list so you can find it easily later:
Save

Activities

Be better prepared before your course. Deepen your understanding during and after it. Supplement your coursework and achieve mastery of the topics covered in Security Management and Governance with these activities:
Review IT Risk Management Principles
Ensures a solid understanding of IT risk management principles, which are fundamental to incident response and cyber resilience.
Browse courses on IT Risk Management
Show steps
  • Review materials from previous courses or certifications
  • Identify common IT risks and their potential impact
  • Analyze and evaluate IT risk management strategies
Review Network Security Concepts
Strengthens understanding of network security principles, which are essential for effective incident response and cyber resilience.
Browse courses on network security
Show steps
  • Review notes and materials from previous courses or certifications
  • Practice configuring and managing network security devices
  • Identify common network security threats and countermeasures
Review Introduction to Information Security Management
Refreshes the fundamentals of information security management, including risk identification and assessment, security controls, and security policies.
Show steps
  • Read the first three chapters
  • Make notes on key concepts
  • Identify areas where you need additional clarification
Five other activities
Expand to see all activities and additional details
Show all eight activities
Incident Response Exercises
Builds skills in identifying, containing, and responding to security incidents through hands-on practice.
Browse courses on Incident Response
Show steps
  • Set up a mock incident scenario
  • Follow incident response procedures
  • Analyze and document the incident
  • Evaluate the effectiveness of the response
Discussion on Incident Response Case Studies
Provides an opportunity to learn from real-world incident response experiences and share insights with peers.
Browse courses on Incident Response
Show steps
  • Identify case studies of successful and unsuccessful incident responses
  • Discuss the key factors that contributed to the outcomes
  • Develop recommendations for improving incident response practices
Cybersecurity Incident Response Workshop
Offers hands-on training in advanced incident response techniques and tools.
Show steps
  • Attend the workshop and participate in exercises
  • Apply the knowledge gained to simulate real-world incident scenarios
  • Develop an incident response plan for your organization
Cybersecurity Culture Awareness Campaign
Enhances understanding of the的重要性 of cybersecurity culture and provides practical experience in developing and implementing awareness campaigns.
Browse courses on Cybersecurity Culture
Show steps
  • Research best practices for cybersecurity awareness
  • Identify target audience and campaign goals
  • Develop campaign materials and messaging
  • Implement the campaign and track its effectiveness
Organize and Review Course Materials
Improves retention by organizing and reviewing key concepts and resources from the course.
Show steps
  • Gather notes, assignments, quizzes, and exams
  • Create a structured system for organizing and storing materials
  • Review materials regularly to reinforce learning

Career center

Learners who complete Security Management and Governance will develop knowledge and skills that may be useful to these careers:
Security Engineer
Security Engineers are responsible for designing, implementing, and maintaining security systems. This course will provide you with the knowledge and skills you need to design and implement security systems, as well as to manage security risks.
Cybersecurity Analyst
Cybersecurity Analysts are responsible for protecting organizations from cyber threats. This course will provide you with the knowledge and skills you need to identify, assess, and mitigate cyber threats, as well as to develop and implement cybersecurity policies and procedures.
Security Consultant
Security Consultants provide advice and guidance to organizations on how to improve their security posture. This course will provide you with the knowledge and skills you need to assess an organization's security risks, develop and implement security solutions, and manage security projects.
Security Administrator
Security Administrators are responsible for managing and maintaining security systems. This course will provide you with the knowledge and skills you need to manage and maintain security systems, as well as to manage security risks.
Information Security Manager
Information Security Managers are responsible for developing and implementing security policies and procedures to protect organizations from security risks. This course will provide you with the knowledge and skills you need to develop and implement an information security management system, as well as to manage security risks.
Security Architect
Security Architects are responsible for designing and implementing security systems. This course will provide you with the knowledge and skills you need to design and implement security systems, as well as to manage security risks.
Chief Information Security Officer (CISO)
Chief Information Security Officers (CISOs) are responsible for overseeing an organization's security program and reporting to the board of directors. This course will provide you with the knowledge and skills you need to develop and implement a security program, as well as to manage security risks. A Master's degree is typically required for this role.
Security Manager
Security Managers are responsible for overseeing an organization's security program. This course will provide you with the knowledge and skills you need to develop and implement a security program, as well as to manage security risks.
Security Specialist
Security Specialists are responsible for providing support to organizations in the development and implementation of security solutions. This course will provide you with the knowledge and skills you need to identify, assess, and mitigate security risks, as well as to develop and implement security policies and procedures.
Security Auditor
Security Auditors are responsible for auditing an organization's security posture and identifying areas for improvement. This course will provide you with the knowledge and skills you need to conduct security audits, identify security risks, and make recommendations for improvement.
Chief Security Officer (CSO)
Chief Security Officers (CSOs) are responsible for overseeing an organization's security program and reporting to the CEO. This course will provide you with the knowledge and skills you need to develop and implement a security program, as well as to manage security risks. A Master's degree is typically required for this role.
Security Trainer
Security Trainers are responsible for developing and delivering security training programs. This course will provide you with the knowledge and skills you need to develop and deliver security training programs, as well as to manage security risks.
Security Officer
Security Officers are responsible for protecting organizations from security threats. This course will provide you with the knowledge and skills you need to identify, assess, and mitigate security threats, as well as to develop and implement security policies and procedures.
Incident Manager
Incident Managers are responsible for identifying, prioritizing, and responding to incidents, which can range from security breaches to natural disasters. This course will provide you with the knowledge and skills you need to develop and implement an incident management plan, as well as to investigate and respond to incidents in a timely and effective manner.
Security Team Lead
Security Team Leads are responsible for leading and managing a team of security professionals. This course will provide you with the knowledge and skills you need to develop and implement a security program, as well as to manage security risks.

Reading list

We've selected seven books that we think will supplement your learning. Use these to develop background knowledge, enrich your coursework, and gain a deeper understanding of the topics covered in Security Management and Governance.
Provides a comprehensive overview of security management, including how to develop and implement security policies, procedures, and controls. It valuable resource for anyone who wants to learn more about managing security in an organization.
Comprehensive study guide for the CISSP certification exam. It covers all ten domains of computer security, and it is an excellent resource for anyone who wants to learn more about information security.
This document provides a comprehensive list of security controls that organizations can use to protect their information systems and data. It valuable resource for anyone who wants to learn more about information security best practices.
Explores the human factors involved in information security, and it provides advice on how to design security systems that are more effective and usable. It is an excellent resource for anyone who wants to learn more about the human side of security.
Provides a fascinating look at the world of social engineering and deception, and it offers advice on how to protect yourself from these threats. It is an excellent resource for anyone who wants to learn more about the art of deception.
Provides a comprehensive overview of incident management, and it offers advice on how to develop and implement an effective incident management program. It valuable resource for anyone who wants to learn more about incident management.
Provides a comprehensive overview of the business of information security, and it offers advice on how to develop and implement an effective information security program. It valuable resource for anyone who wants to learn more about the business of information security.

Share

Help others find this course page by sharing it with your friends and followers:

Similar courses

Here are nine courses similar to Security Management and Governance.
Security Operations: Business Resilience and Incident...
Most relevant
Monitoring, Logging and Responding to Incidents
Most relevant
In the Trenches: Security Operations Center
Most relevant
Operations and Incident Response for CompTIA Security+
Most relevant
Cyber Security: Executive Briefing
Most relevant
Operations and Incident Response for CompTIA Security+
Most relevant
DP-203: Secure, Monitor, and Optimize Data Storage and...
Most relevant
Incident Investigation with IBM Security QRadar
Most relevant
Incident Management and Continuous Improvement
Most relevant
Our mission

OpenCourser helps millions of learners each year. People visit us to learn workspace skills, ace their exams, and nurture their curiosity.

Our extensive catalog contains over 50,000 courses and twice as many books. Browse by search, by topic, or even by career interests. We'll match you to the right resources quickly.

Find this site helpful? Tell a friend about us.

Affiliate disclosure

We're supported by our community of learners. When you purchase or subscribe to courses and programs or purchase books, we may earn a commission from our partners.

Your purchases help us maintain our catalog and keep our servers humming without ads.

Thank you for supporting OpenCourser.

© 2016 - 2024 OpenCourser