We may earn an affiliate commission when you visit our partners.
Aaron Rosenmund

An organization's commitment to enterprise cybersecurity underpins its ability to execute business operations. Learn how modern organizations leverage cybersecurity functions to protect their products, services, and bottom line.

Read more

An organization's commitment to enterprise cybersecurity underpins its ability to execute business operations. Learn how modern organizations leverage cybersecurity functions to protect their products, services, and bottom line.

The importance and meaning of enterprise security to an organization's bottom line has changed significantly over the years. The requirement for IT enablement of products and services has made the understanding and adoption of best practices and common business functions a ubiquitous requirement for protecting information, services, and ultimately the bottom line. This course explains how an organization's needs translate into enterprise security priorities. You first learn the tenets of secure engineering, architecture, and administration of products and networks. Then cover the continuous role of defensive and offensive security operations. Ending with governance, compliance, and ultimately how these functions work together to accomplish risk management and mitigation. All to prepare you to understand the importance and complexity of tasks required to keep up with the ever-changing landscape of threats and vulnerabilities.

Enroll now

Here's a deal for you

We found an offer that may be relevant to this course.
Save money when you learn. All coupon codes, vouchers, and discounts are applied automatically unless otherwise noted.

What's inside

Syllabus

Enterprise Security: Executive Briefing

Good to know

Know what's good
, what to watch for
, and possible dealbreakers
Appropriate for learners with an established foundation in cybersecurity
Appropriate for learners who work in the information technology industry
Appropriate for learners who work as cybersecurity consultants
Recommended for learners who work as cybersecurity engineers
Recommended for learners with experience in system administration
Recommended for learners with experience in information assurance

Save this course

Save Enterprise Security: Executive Briefing to your list so you can find it easily later:
Save

Activities

Be better prepared before your course. Deepen your understanding during and after it. Supplement your coursework and achieve mastery of the topics covered in Enterprise Security: Executive Briefing with these activities:
Practice Risk Assessment
Practice risk assessment process to understand the identification, analysis, and mitigation of security risks more deeply.
Browse courses on Risk Management
Show steps
  • Identify potential risks to an organization's information assets
  • Analyze the likelihood and impact of each risk
  • Develop and implement mitigation strategies
Follow Tutorials on OWASP Top 10
Understanding the OWASP Top 10 vulnerabilities will provide a strong basis for understanding common web application security issues.
Browse courses on OWASP
Show steps
  • Identify the top 10 web application vulnerabilities
  • Learn how to prevent and detect each vulnerability
  • Practice implementing security measures to address the vulnerabilities
Practice Password Cracking
Improving password cracking skills will provide insight into password hashing, encryption, and security strength.
Browse courses on Password Cracking
Show steps
  • Learn about different password cracking techniques
  • Practice using password cracking tools
  • Develop strategies to prevent password cracking
Four other activities
Expand to see all activities and additional details
Show all seven activities
Attend a Cybersecurity Workshop
Attending workshops can enhance understanding of latest trends and techniques in cybersecurity.
Show steps
  • Identify and register for a relevant cybersecurity workshop
  • Prepare for the workshop by reviewing materials and completing any pre-work
  • Attend the workshop
Develop a Cybersecurity Policy
Creating a cybersecurity policy will provide hands-on experience in designing and implementing security measures.
Browse courses on Cybersecurity Policy
Show steps
  • Identify the scope and objectives of the cybersecurity policy
  • Research and identify relevant regulations and standards
  • Develop the policy content, including security controls and procedures
  • Review and finalize the policy
Contribute to Open Source Security Projects
Contributing to open source security projects provides practical experience in real-world security issues.
Browse courses on Open Source Security
Show steps
  • Identify open source security projects to contribute to
  • Review the project documentation and code
  • Identify and fix security vulnerabilities
Mentor Junior Cybersecurity Professionals
Mentoring junior cybersecurity professionals can reinforce understanding of concepts while helping others.
Show steps
  • Identify opportunities to mentor junior cybersecurity professionals
  • Provide guidance and support to mentees
  • Share knowledge and expertise

Career center

Learners who complete Enterprise Security: Executive Briefing will develop knowledge and skills that may be useful to these careers:
Security Analyst
Security Analysts are on the front lines of protecting a business's IT infrastructure. In an era of cloud-based networks, remote work, and BYOD policies, the development and execution of information security strategies has become paramount for protection against ransomware, malware, phishing, and other malicious cyberthreats. This comprehensive course from Northwestern's School of Professional Studies will provide you with the critical knowledge and skills needed to design, implement, and manage an effective information security program, and may help you prepare for the CISM or CISSP certification.
Security Manager
Security Managers, also known as Information Security Managers, build and manage an organization's cybersecurity program. They oversee the infrastructure and tools used to safeguard networks, data, and applications. Furthermore, they are responsible for the development of an organization's disaster recovery and data backup plan. This course from Northwestern's School of Professional Studies will help equip you with the knowledge and techniques to manage security risks, prepare for and respond to security breaches, and effectively lead an information security team.
Network Architect
Network Architects design, implement, and maintain computer networks for organizations of all sizes. As organizations' networks become more complex, they must carefully plan and configure their networks to meet the demands of their business. This course from Northwestern's School of Professional Studies will provide you with a comprehensive foundation in computer networking and security, and will aid you in obtaining the skills needed to plan, design, and manage a robust and secure network infrastructure.
Cybersecurity Engineer
Cybersecurity Engineers plan, implement, and maintain security controls to protect an organization's computer systems and networks. They identify vulnerabilities in security systems, implement and manage firewalls and intrusion detection systems, and conduct security audits. This course from NetwWorking's School of Professional Studies will help you build a solid foundation in cybersecurity principles and practices, and will prepare you for the CISSP certification.
Information Security Analyst
Information Security Analysts monitor and analyze an organization's computer systems and networks for security breaches. They develop and implement security policies and procedures, and provide guidance to employees on how to protect the organization's information assets. This course from Northwestern's School of Professional Studies will provide you with a hands-on approach to information security, will help you build a solid foundation in the principles and practices of information security, and will prepare you for the CISSP certification.
Security Operations Manager
Security Operations Managers are responsible for the day-to-day operations of an organization's security program. They oversee the implementation and management of security controls, monitor security logs and alerts, and investigate security incidents. This course from Northwestern's School of Professional Studies will provide you with the knowledge and skills needed to effectively manage an information security operations team and will aid you in preparing for the CISSP or CISM certification.
Security Consultant
Security Consultants help organizations develop and implement security strategies and plans. They assess an organization's security risks, identify vulnerabilities, and recommend solutions. This course from Northwestern's School of Professional Studies will provide you with a comprehensive understanding of information security risks and controls, and will help prepare you for the CISSP or CISM certification.
Risk Manager
Risk Managers identify, assess, and mitigate an organization's risks. They develop and implement risk management plans, and provide guidance to senior management on risk-related decisions. This course from Northwestern's School of Professional Studies will provide you with a comprehensive understanding of risk management principles and practices, and will help prepare you for the CRISC or CISM certification.
Compliance Manager
Compliance Managers develop and implement compliance programs for organizations. They ensure that organizations comply with applicable laws and regulations, and industry standards. This course from Northwestern's School of Professional Studies will provide you with a comprehensive understanding of compliance management principles and practices, and will help prepare you for the CCEP or CISM certification.
IT Auditor
IT Auditors evaluate an organization's computer systems and controls to ensure that they are operating effectively and securely. They identify risks and vulnerabilities, and make recommendations for improvements. This course from Northwestern's School of Professional Studies will provide you with comprehensive knowledge of IT auditing principles and practices, and will help prepare you for the CISA certification.
Forensic Analyst
Forensic Analysts investigate computer systems and networks to collect evidence of crimes. They analyze data to identify and track down criminals, and help law enforcement and government agencies prosecute cybercrimes. This course from Northwestern's School of Professional Studies may be useful for building a foundation in computer forensics and incident response, and will help you prepare for the CFCE certification.
IT Project Manager
IT Project Managers plan, execute, and control IT projects. They ensure that projects are completed on time, within budget, and to the required specifications. This course from Northwestern's School of Professional Studies may be useful for building a foundation in project management principles and practices, and will help you prepare for the PMP certification.
Data Scientist
Data Scientists use statistical and machine learning techniques to analyze data and extract insights. They develop models to predict future trends, and help organizations make better decisions. This course from Northwestern's School of Professional Studies may be useful for building a foundation in data science principles and practices, and will help prepare you for additional certifications in data science.
Software Developer
Software Developers design, develop, and maintain computer software. They work with users to understand their needs, and then design and develop software solutions that meet those needs. This course from Northwestern's School of Professional Studies may be useful for building a foundation in software development principles and practices, and will help prepare you for additional certifications in software development.
Systems Analyst
Systems Analysts study an organization's business processes and identify opportunities for improvement. They develop and implement new systems that help organizations operate more efficiently and effectively. This course from Northwestern's School of Professional Studies may be useful for building a foundation in systems analysis principles and practices.

Reading list

We've selected 16 books that we think will supplement your learning. Use these to develop background knowledge, enrich your coursework, and gain a deeper understanding of the topics covered in Enterprise Security: Executive Briefing.
Provides a comprehensive overview of the field of enterprise security risk management, covering topics such as risk assessment, risk mitigation, and risk monitoring.
This textbook provides a comprehensive overview of computer security, covering topics such as cryptography, access control, and network security. It foundational text and useful for students and professionals alike.
Provides a practical guide to penetration testing, including techniques for identifying and exploiting vulnerabilities. It valuable resource for security professionals and pentesters.
Provides an in-depth look at network security, covering topics such as firewalls, intrusion detection systems, and VPNs. It valuable resource for network engineers and security professionals.
This guide provides practical guidance on how to respond to security incidents, including incident detection, containment, and recovery. It valuable resource for security professionals and incident responders.
Provides a hands-on guide to malware analysis, covering topics such as malware identification, reverse engineering, and forensic analysis. It valuable resource for security professionals and malware analysts.
Provides a practical introduction to threat modeling, which process for identifying and mitigating threats to information systems. It valuable resource for security professionals and software developers.
A comprehensive guide to security engineering, covering topics such as secure design, implementation, and testing.
A fascinating look at the human element of security, and how attackers use deception to exploit vulnerabilities.
An exploration of the human factors involved in security, and how to design security systems that are more resistant to human error.
A comprehensive guide to preparing for the CISSP certification exam.

Share

Help others find this course page by sharing it with your friends and followers:

Similar courses

Here are nine courses similar to Enterprise Security: Executive Briefing.
Our mission

OpenCourser helps millions of learners each year. People visit us to learn workspace skills, ace their exams, and nurture their curiosity.

Our extensive catalog contains over 50,000 courses and twice as many books. Browse by search, by topic, or even by career interests. We'll match you to the right resources quickly.

Find this site helpful? Tell a friend about us.

Affiliate disclosure

We're supported by our community of learners. When you purchase or subscribe to courses and programs or purchase books, we may earn a commission from our partners.

Your purchases help us maintain our catalog and keep our servers humming without ads.

Thank you for supporting OpenCourser.

© 2016 - 2024 OpenCourser