We may earn an affiliate commission when you visit our partners.
Course image
Mike Hughes and Clive Webb

This course is designed for accountancy, finance and business professionals working in all organisations from small business, large corporates or financial services or who are just interested in learning more about the vulnerabilities organisations are exposed to and the options available to protect their organisation. With a focus on practical skills throughout, this course provides the ability to apply skills as well as understand them.

What's inside

Learning objectives

  • How to facilitate a risk assessment to identify the potential threats and the vulnerabilities they may exploit and the business impacts of a cyber-attack.
  • Recognise that the risks are constantly changing and the need for continuous process improvement. including how to monitor and report on the effectiveness of the cyber/information security practices.
  • Understand how to manage an incident and the processes required to effectively respond and recover.
  • Understand that effective security protection is a combination of people, process and technology and how to create a culture of cyber and information security.
  • Understand the physical and logical access controls which should be implemented to adequately and appropriately protect the organisation’s information and technology resources.
  • Understand the potential risk responses and mitigation actions to appropriately and adequately protect the business from the identified cyber risks.

Syllabus

1. Introduction
Objectives of the course
Outline of the cyber threat
What’s different about cyber
Read more
2. The basic hygiene factors
Secure configuration of IT infrastructure
Malware protection
Configuring network devices securely
3. Approach and effective access controls
Implement approaches and effective access controls
The importance of 2 factor authentication
4. Understand risks
Principles of risk management
Manging the risks effectively
5. Understand and manage third-party supplier risks
Manging the full supply chain
Information value and sensitivity
Supplier impacts on service delivery
6. Understand and manage third-party supplier risks
Encouraging a cyber-security aware culture
Words into actions
7. Respond and recovery
Incident management capability
Respond and recover plan for breaches
8. Continuous improvement
The need for performance monitoring
Defining appropriate KPIs
Performance dashboard
9. Skills and resources
The importance of access to the right skills
The need for up-to-date training
10. Concluding themes

Good to know

Know what's good
, what to watch for
, and possible dealbreakers
Develops skills and knowledge that are useful for personal growth and development
Builds a strong foundation for beginners
Strengthens an existing foundation for intermediate learners
Suitable for business professionals working in all organisations, from small business to large corporates or financial services
Suitable for those interested in learning more about cybersecurity vulnerabilities
Provides the ability to apply skills as well as understand them

Save this course

Save Manage the cyber threat for finance professionals to your list so you can find it easily later:
Save

Activities

Be better prepared before your course. Deepen your understanding during and after it. Supplement your coursework and achieve mastery of the topics covered in Manage the cyber threat for finance professionals with these activities:
Review basic information security concepts
Refresh your knowledge of basic information security concepts, such as confidentiality, integrity, and availability, to prepare for the course.
Browse courses on Information Security
Show steps
  • Define and explain the CIA triad
  • Discuss common types of cyberattacks
  • Explain the importance of risk management in information security
Review fundamental networking and operating system concepts
Review the basics of networking and operating systems to strengthen your foundational knowledge before starting the course.
Browse courses on Networking
Show steps
  • Define and explain network protocols
  • Configure basic network devices
  • Troubleshoot common operating system issues
Volunteer with a local cyber security organization
Volunteer with a local cyber security organization to gain practical experience and contribute to your community.
Browse courses on Cyber Security
Show steps
  • Identify local cyber security organizations
  • Contact the organization and express your interest
  • Attend volunteer training or workshops
Six other activities
Expand to see all activities and additional details
Show all nine activities
Follow online tutorials on cyber security best practices
Search for and follow online tutorials that provide practical guidance on cyber security best practices, such as secure configuration and incident response.
Browse courses on Cyber Security
Show steps
  • Select tutorials that cover relevant topics
  • Identify reputable online resources
  • Complete the tutorials and take notes
Participate in study groups or online discussions
Engage with peers in study groups or online discussions to share knowledge, ask questions, and reinforce your understanding of course concepts.
Show steps
  • Join or create a study group
  • Participate actively in discussions
  • Contribute to group projects or assignments
Practice applying risk assessment techniques
Practice applying what you learn in the course about risk assessment techniques through exercises and simulations.
Show steps
  • Identify potential threats and risks
  • Assess the likelihood and impact of each risk
  • Develop and implement mitigation strategies
Build a resource library of cyber security tools and resources
Gather and organize a collection of useful cyber security tools and resources, including articles, videos, and software, to support your learning.
Browse courses on Cyber Security
Show steps
  • Identify reputable cyber security resources
  • Collect and organize resources into different categories
  • Share your resource library with others
Create a flowchart or diagram to visualize a security incident response plan
Create a flowchart or diagram that outlines the steps involved in responding to a security incident, including containment, eradication, and recovery.
Show steps
  • Identify the key steps in an incident response plan
  • Create a visual representation of the steps
  • Share your flowchart or diagram with others for feedback
Develop a security awareness training program for your organization
Create a comprehensive training program to raise awareness about cyber security risks and best practices within your organization.
Show steps
  • Identify training objectives and target audience
  • Develop training materials and activities
  • Deliver the training program to your organization

Career center

Learners who complete Manage the cyber threat for finance professionals will develop knowledge and skills that may be useful to these careers:
IT Security Consultant
As an IT Security Consultant, you will work to protect businesses from cyber threats. You can use the knowledge you gain in this course on *Manage the Cyber Threat for Finance Professionals* to help you identify vulnerabilities in a business's IT infrastructure and implement measures to mitigate them.
Information Security Analyst
Information Security Analysts plan and carry out security measures to protect an organization's computer networks and systems. The *Manage the Cyber Threat for Finance Professionals* course will help you to conduct risk assessments, develop security plans, and implement security controls.
Cybersecurity Engineer
Cybersecurity Engineers design, implement, and maintain an organization's cybersecurity infrastructure. The *Manage the Cyber Threat for Finance Professionals* course covers topics such as risk assessment, incident response, and security controls, which will be essential knowledge for you in this role.
IT Auditor
IT Auditors assess an organization's IT systems and controls to ensure that they are secure and compliant with regulations. The *Manage the Cyber Threat for Finance Professionals* course will provide you with a foundation in cybersecurity and risk management, which will be valuable for you in this role.
Security Analyst
Security Analysts monitor and analyze security data to identify and respond to threats. The *Manage the Cyber Threat for Finance Professionals* course will provide you with a foundation in cybersecurity and incident response, which will be valuable for you in this role.
Risk Manager
Risk Managers identify, assess, and mitigate risks to an organization. The *Manage the Cyber Threat for Finance Professionals* course will provide you with a foundation in risk management, which will be valuable for you in this role.
Compliance Analyst
Compliance Analysts ensure that an organization's operations are in compliance with regulations. The *Manage the Cyber Threat for Finance Professionals* course will provide you with a foundation in cybersecurity and compliance, which will be valuable for you in this role.
Incident Responder
Incident Responders investigate and respond to security incidents. The *Manage the Cyber Threat for Finance Professionals* course will provide you with a foundation in incident response, which will be valuable for you in this role.
Penetration Tester
Penetration Testers assess an organization's security by simulating cyber attacks. The *Manage the Cyber Threat for Finance Professionals* course will provide you with a foundation in cybersecurity and penetration testing, which will be valuable for you in this role.
Security Architect
Security Architects design and implement an organization's security infrastructure. The *Manage the Cyber Threat for Finance Professionals* course will provide you with a foundation in cybersecurity and security architecture, which will be valuable for you in this role.
Cybersecurity Consultant
Cybersecurity Consultants provide advice and support to organizations on cybersecurity matters. The *Manage the Cyber Threat for Finance Professionals* course will provide you with a foundation in cybersecurity and consulting, which will be valuable for you in this role.
Chief Information Security Officer (CISO)
Chief Information Security Officers (CISOs) are responsible for overseeing an organization's cybersecurity program. The *Manage the Cyber Threat for Finance Professionals* course will provide you with a foundation in cybersecurity leadership and management, which will be valuable for you in this role.
Chief Technology Officer (CTO)
Chief Technology Officers (CTOs) are responsible for overseeing an organization's technology strategy. The *Manage the Cyber Threat for Finance Professionals* course will provide you with a foundation in cybersecurity and technology management, which will be valuable for you in this role.
Chief Risk Officer (CRO)
Chief Risk Officers (CROs) are responsible for overseeing an organization's risk management program. The *Manage the Cyber Threat for Finance Professionals* course will provide you with a foundation in risk management and cybersecurity, which will be valuable for you in this role.
Chief Compliance Officer (CCO)
Chief Compliance Officers (CCOs) are responsible for overseeing an organization's compliance program. The *Manage the Cyber Threat for Finance Professionals* course will provide you with a foundation in compliance and cybersecurity, which will be valuable for you in this role.

Reading list

We've selected eight books that we think will supplement your learning. Use these to develop background knowledge, enrich your coursework, and gain a deeper understanding of the topics covered in Manage the cyber threat for finance professionals.
Provides essential insights and guidance on cyber security for finance and accounting professionals. It is particularly valuable for individuals who seek a comprehensive understanding of cyber threats, risk management, and incident response.
This official study guide for the Certified Information Systems Auditor (CISA) certification provides comprehensive coverage of the audit process and control objectives for information systems. It valuable resource for finance professionals who seek to enhance their understanding of IT audit.
Provides a practical guide to cybersecurity for managers and executives. It offers a non-technical overview of key concepts and best practices, enabling readers to make informed decisions about cybersecurity risks and investments.
Provides a unique perspective on cybersecurity from the perspective of a former hacker. It offers insights into the techniques used by attackers and provides practical advice on how to defend against social engineering and other forms of deception.
Provides a technical overview of hacking techniques and exploits. It offers a deep dive into the tools and methods used by hackers, making it particularly valuable for professionals who seek to enhance their understanding of the technical aspects of cybersecurity.
Explores the psychological aspects of cybersecurity, examining the human factors that contribute to security vulnerabilities. It offers insights into how biases, cognitive errors, and social engineering techniques can be exploited by attackers.
Provides an overview of cybersecurity law and regulation, covering topics such as data privacy, intellectual property, and cybercrime. It offers insights into the legal implications of cybersecurity breaches and provides guidance on how to comply with legal requirements.
Provides a hands-on guide to penetration testing, covering topics such as vulnerability assessment, exploitation, and reporting. It offers practical advice on how to identify and exploit security vulnerabilities in real-world environments.

Share

Help others find this course page by sharing it with your friends and followers:

Similar courses

Here are nine courses similar to Manage the cyber threat for finance professionals.
Sports Management: Strategy and Performance
Keynote with Cushing Anderson, IDC
Robotic process and intelligent automation for finance
Understanding Modern Business and Organisations
Getting Started with Leadership
International Business Environment
Business Sustainability in the Circular Economy
Digital Wellbeing and Productivity
Reputation Crisis? Facebook meets Cambridge Analytica
Our mission

OpenCourser helps millions of learners each year. People visit us to learn workspace skills, ace their exams, and nurture their curiosity.

Our extensive catalog contains over 50,000 courses and twice as many books. Browse by search, by topic, or even by career interests. We'll match you to the right resources quickly.

Find this site helpful? Tell a friend about us.

Affiliate disclosure

We're supported by our community of learners. When you purchase or subscribe to courses and programs or purchase books, we may earn a commission from our partners.

Your purchases help us maintain our catalog and keep our servers humming without ads.

Thank you for supporting OpenCourser.

© 2016 - 2024 OpenCourser