We may earn an affiliate commission when you visit our partners.
Course image
Course image
Coursera logo

Personnel & Third-Party Security

Qasim Ijaz

In this course, you will learn all about the process of implementing effective education, training, and awareness programs. You will also study the role personnel security plays in protecting an organization’s assets, intellectual property, and physical assets. You will also be introduced to the steps required for effective Vendor Risk Management (VRM), including: due diligence, contracting, monitoring & accessing, and termination. Throughout the course, you will engage with current case studies that illustrate the key concepts in your lessons. You will also have the chance to submit assignments in which you will apply the material in a practical application.

Enroll now

What's inside

Syllabus

Education, Training, & Awareness
Welcome to the first module of Personnel & Third Party Security! Education, training, and awareness of security threats are important for many actors within an organization. It’s not only your users who make bad decisions, it’s also administrators, IT staff, security staff, and risk assessors. In this module we will dive into the process of implementing effective education, training, and awareness programs.
Read more
Personnel Security
Welcome to Module 2! Personnel security plays a critical role in protecting an organization’s assets, for example intellectual property, such as customer data or physical assets. Organizations define their security requirements around personnel’s use of organizational assets and then use technical and physical controls to implement them. Through personnel security controls, we work towards a reduction in the misuse, theft, or fraud related to our assets.
Vendor Risk Management
Welcome to Module 3! In this module we will introduce the steps required for effective Vendor Risk Management (VRM), including: due diligence, contracting, monitoring and accessing, as well as termination. When it comes to VRM, we cannot completely eliminate all risk, however, we may be able to reduce risk. The key is to ensure there is no "unacceptable" risk.
Acquisition Strategy
Welcome to the fourth and final module of Personnel & Third-Party Security! Imagine you just bought new hardware, software, or merged with another company. How do you ensure that these actions do not reduce your cyber security posture and increase your risk to external and internal threats? Introducing cyber security risk considerations into acquisition strategy can help deal with these concerns.

Good to know

Know what's good
, what to watch for
, and possible dealbreakers
Introduces risk management for third-party vendors, which is growing in relevance to prevent cyber threats
Develops key competencies for personnel security, a core component of modern IT and operational risk management
Provides in-depth knowledge on vendor risk management, which is invaluable for professionals managing third-party relationships
Suits personnel responsible for educating, training, and raising security awareness in organizations
Emphasizes the role of personnel security in protecting organizational assets, such as intellectual property and customer data
Provides thorough coverage of the steps involved in conducting vendor risk assessments

Save this course

Save Personnel & Third-Party Security to your list so you can find it easily later:
Save

Reviews summary

Rewarding third-party security course

Learners say this engaging course is helpful for developing security awareness. Excellent instructors and useful readings make the learning process enjoyable. Students also appreciate the interesting case studies that help them apply what they learn. Overall, this course provides a solid overview of personnel and third-party security.
Course provides a broad perspective on the field of personnel and third-party security.
"Course provides a good overview of the main topics to be address for personnel security awareness and third party review."
"I have been studying cybersecurity for some time. And this program has a lot of innovative concepts."
Case studies help learners apply their knowledge and make the material more engaging.
"Excellent teacher. Very useful readings. Very interesting case study, especially the teacher's answer."
Instructors are well-received by learners.
"Excellent teacher."
"Really its content is very good."
"This course was easy and I had a hard time understanding the cyber talk, but it was very fun and I enjoyed the course work."

Activities

Coming soon We're preparing activities for Personnel & Third-Party Security. These are activities you can do either before, during, or after a course.

Career center

Learners who complete Personnel & Third-Party Security will develop knowledge and skills that may be useful to these careers:
IT Auditor
An IT Auditor reviews an organization's computer systems and networks to ensure that they are secure and compliant with regulations. This course would be very helpful for one looking to work in this field. This course would provide valuable training on how to implement security training and awareness programs and an introduction to Vendor Risk Management (VRM).
Information Security Analyst
An Information Security Analyst plans, implements, and does security audits for an organization's computer networks. This course would be very helpful for one looking to work in this field. This course would provide valuable training on how to implement security training and awareness programs and an introduction to Vendor Risk Management (VRM).
Security Consultant
A Security Consultant provides consulting services to help organizations improve their security posture. This course would be very helpful for one looking to work in this field. This course would provide valuable training on how to implement security training and awareness programs and an introduction to Vendor Risk Management (VRM).
Security Manager
A Security Manager is responsible for the overall security of an organization's information systems. This course would be very helpful for one looking to work in this field. This course would provide valuable training on how to implement security training and awareness programs and an introduction to Vendor Risk Management (VRM).
Compliance Manager
A Compliance Manager ensures that an organization is compliant with all applicable laws and regulations. This course would be very helpful for one looking to work in this field. This course would provide valuable training on how to implement security training and awareness programs and an introduction to Vendor Risk Management (VRM).
Risk Manager
A Risk Manager assesses and manages risks to an organization's assets. This course would be very helpful for one looking to work in this field. This course would provide valuable training on how to implement security training and awareness programs and an introduction to Vendor Risk Management (VRM).
Penetration Tester
A Penetration Tester tests an organization's security systems for vulnerabilities. This course may be helpful for one looking to work in this field. This course would provide training on how to implement security training and awareness programs.
Security Architect
A Security Architect designs and implements an organization's security architecture. This course may be helpful for one looking to work in this field. This course would provide training on how to implement security training and awareness programs.
Forensic Analyst
A Forensic Analyst investigates computer crimes. This course may be helpful for one looking to work in this field. This course would provide training on how to implement security training and awareness programs.
Security Analyst
A Security Analyst monitors an organization's security systems for threats and vulnerabilities. This course may be helpful for one looking to work in this field. This course would provide training on how to implement security training and awareness programs.
Network Administrator
A Network Administrator manages an organization's computer networks. This course may be helpful for one looking to work in this field. This course would provide training on how to implement security training and awareness programs.
Security Engineer
A Security Engineer designs, implements, and maintains an organization's security systems. This course may be helpful for one looking to work in this field. This course would provide training on how to implement security training and awareness programs.
Systems Administrator
A Systems Administrator manages an organization's computer systems. This course may be helpful for one looking to work in this field. This course would provide training on how to implement security training and awareness programs.
Database Administrator
A Database Administrator manages an organization's databases. This course may be helpful for one looking to work in this field. This course would provide training on how to implement security training and awareness programs.
Incident Responder
An Incident Responder responds to security incidents. This course may be helpful for one looking to work in this field. This course would provide training on how to implement security training and awareness programs.

Reading list

We've selected nine books that we think will supplement your learning. Use these to develop background knowledge, enrich your coursework, and gain a deeper understanding of the topics covered in Personnel & Third-Party Security.
Presents a comprehensive guide to developing and implementing an effective information security strategy, aligning it with organizational objectives.
Offers a practical guide to network security assessment, providing techniques for identifying vulnerabilities and implementing effective security measures.
Offers a practical guide to penetration testing, providing step-by-step instructions for identifying and exploiting vulnerabilities.
This practical handbook offers a step-by-step guide to conducting information security risk assessments, providing valuable insights for risk managers and security professionals.
Provides a comprehensive overview of hacking techniques, covering topics such as vulnerability assessment, exploit development, and countermeasures.
Offers a practical guide to using Metasploit, a popular open-source penetration testing framework, providing valuable insights for security professionals.
Offers insights into the techniques used by hackers and social engineers, providing valuable information for understanding and preventing security breaches.
This industry-respected manual serves as a valuable resource for preparing for the CISA certification, covering key concepts in information systems auditing and control.

Share

Help others find this course page by sharing it with your friends and followers:
Our mission

OpenCourser helps millions of learners each year. People visit us to learn workspace skills, ace their exams, and nurture their curiosity.

Our extensive catalog contains over 50,000 courses and twice as many books. Browse by search, by topic, or even by career interests. We'll match you to the right resources quickly.

Find this site helpful? Tell a friend about us.

Affiliate disclosure

We're supported by our community of learners. When you purchase or subscribe to courses and programs or purchase books, we may earn a commission from our partners.

Your purchases help us maintain our catalog and keep our servers humming without ads.

Thank you for supporting OpenCourser.

© 2016 - 2024 OpenCourser