We may earn an affiliate commission when you visit our partners.
John Elliott

Every organization needs to protect itself from cyber threats. This course covers the essentials of cyber security, you will learn about threats, vulnerabilities and the protective, defensive and corrective controls deployed by organizations.

Read more

Every organization needs to protect itself from cyber threats. This course covers the essentials of cyber security, you will learn about threats, vulnerabilities and the protective, defensive and corrective controls deployed by organizations.

A cyber incident can have a significant effect on an organization. Investors, customers and regulators expect cyber security be to managed from the board downwards, so every executive needs the basic understanding of cyber security that you will learn in this course. First, you will meet the attackers who want to harm an organization. Next, you’ll learn how they break into computer systems through vulnerabilities and how an organization defends itself using a risk-based combination of preventative, detective and corrective controls. Finally, you will understand some of the ways that controls are managed, the basics of application security and the typical roles needed to support cyber security in an organization. When you’re finished with this executive briefing you’ll will have the high-level understanding of cyber security that’s essential for every executive and IT professional.

Enroll now

Here's a deal for you

We found an offer that may be relevant to this course.
Save money when you learn. All coupon codes, vouchers, and discounts are applied automatically unless otherwise noted.

What's inside

Syllabus

Cyber Security Essentials
Risk, Threats, Vulnerabilities, and Controls
Practical Cyber Security for Every Organization

Good to know

Know what's good
, what to watch for
, and possible dealbreakers
Covers the fundamentals of cybersecurity, making it suitable for executives and IT professionals needing a general understanding of the subject
The course is taught by John Elliott, an expert in the field of cybersecurity
Provides a comprehensive overview of cyber threats, vulnerabilities, and controls, preparing learners to address cybersecurity concerns within their organizations
Explores the motivations and techniques of cyber attackers, helping learners understand the threats their organizations face
Emphasizes the importance of a risk-based approach to cybersecurity, enabling learners to prioritize their organization's security investments
Covers the roles and responsibilities involved in managing cybersecurity within an organization, ensuring learners understand the necessary infrastructure for effective security

Save this course

Save Cyber Security: Executive Briefing to your list so you can find it easily later:
Save

Activities

Be better prepared before your course. Deepen your understanding during and after it. Supplement your coursework and achieve mastery of the topics covered in Cyber Security: Executive Briefing with these activities:
Review network security principles and protocols
Strengthen your understanding of foundational network security concepts, ensuring a solid grasp of the underpinnings of cyber security.
Show steps
  • Review notes or textbooks on network security principles, such as firewalls, intrusion detection systems, and VPNs.
  • Complete online quizzes or exercises on network security protocols.
  • Attend a webinar or workshop on network security best practices.
Practice using network security tools
Enhance your proficiency in using essential network security tools, such as packet analyzers, intrusion detection systems, and vulnerability scanners.
Browse courses on Network Security Tools
Show steps
  • Install and configure network security tools on a virtual machine or in a lab environment.
  • Practice using the tools to analyze network traffic, identify threats, and configure security measures.
  • Complete online tutorials or challenges on using network security tools.
Follow Pluralsight tutorials
Reinforce learning with video demonstrations and expertise from a Pluralsight expert.
Browse courses on Cyber Security
Show steps
  • Search Pluralsight for relevant tutorials
  • Watch and take notes on tutorials
  • Practice skills demonstrated in tutorials
Five other activities
Expand to see all activities and additional details
Show all eight activities
Practice identifying and mitigating cyber threats
Engage in hands-on exercises that simulate real-world cyber threats, enhancing your ability to identify and mitigate potential attacks.
Browse courses on Cyber Threat Analysis
Show steps
  • Participate in online cyber security simulations or capture-the-flag events.
  • Set up a virtual lab environment to practice threat detection and response.
  • Join a cyber security community or forum to engage in discussions and case studies.
Create a cyber security knowledge base
Organize and synthesize your learning materials, including notes, assignments, and quizzes, into a comprehensive knowledge base for future reference.
Show steps
  • Compile notes, handouts, and assignments from the course into a central location.
  • Create summaries or mind maps to consolidate key concepts.
  • Use online tools or software to organize and annotate your resources.
Explore advanced cyber security techniques
Expand your knowledge by following expert-led tutorials on advanced cyber security techniques, industry best practices, and compliance frameworks.
Show steps
  • Enroll in online courses or certification programs on advanced cyber security topics.
  • Watch video tutorials or webinars from reputable cyber security professionals.
  • Read white papers and research articles on emerging cyber security trends.
Develop a cyber security risk assessment plan
Apply your knowledge to a practical project by designing a risk assessment plan that identifies and prioritizes potential cyber threats to an organization.
Show steps
  • Identify the scope and objectives of the risk assessment.
  • Conduct a threat analysis to identify potential cyber threats.
  • Assess the likelihood and impact of each identified threat.
  • Develop mitigation strategies and controls to address the identified risks.
Write a white paper on cyber security best practices
Share your insights and knowledge by writing a white paper that outlines best practices for cyber security, providing valuable information to the industry.
Show steps
  • Research and gather information on current cyber security best practices.
  • Organize your findings into a logical structure.
  • Write and edit the white paper, ensuring clarity and conciseness.
  • Submit your white paper to industry publications or websites for potential publication.

Career center

Learners who complete Cyber Security: Executive Briefing will develop knowledge and skills that may be useful to these careers:
Security Engineer
A Security Engineer is responsible for designing, implementing, and maintaining security measures to protect an organization's computer systems and networks. This course may be helpful for those interested in this role as it provides an overview of the different types of cyber security threats and how to defend against them. Additionally, the course covers the basics of application security and the typical roles needed to support cyber security in an organization.
Cyber Security Engineer
A Cyber Security Engineer designs, implements, and maintains security measures to protect an organization's computer systems and networks. This course may be helpful for those interested in this role as it provides an overview of the different types of cyber security threats and how to defend against them. Additionally, the course covers the basics of application security and the typical roles needed to support cyber security in an organization.
Information Security Manager
An Information Security Manager is responsible for overseeing the information security program for an organization. This course may be useful for those interested in this role as it provides an overview of the different types of cyber security threats and how to defend against them. Additionally, the course covers the basics of application security and the typical roles needed to support cyber security in an organization.
Cyber Security Analyst
A Cyber Security Analyst investigates and responds to cyber security incidents. This course may be helpful for those interested in this role as it provides an overview of the different types of cyber security threats and how to defend against them. Additionally, the course covers the basics of application security and the typical roles needed to support cyber security in an organization.
Cyber Security Manager
A Cyber Security Manager is responsible for overseeing the cyber security program for an organization. This course may be useful for those interested in this role as it provides an overview of the different types of cyber security threats and how to defend against them. Additionally, the course covers the basics of application security and the typical roles needed to support cyber security in an organization.
Information Security Officer
An Information Security Officer is responsible for protecting an organization's information and data from unauthorized access, use, disclosure, disruption, modification, or destruction. This course may be useful for those interested in this role as it provides an overview of the different types of cyber security threats and how to defend against them. Additionally, the course covers the basics of application security and the typical roles needed to support cyber security in an organization.
Information Security Specialist
An Information Security Specialist is responsible for protecting an organization's information and data from unauthorized access, use, disclosure, disruption, modification, or destruction. This course may be useful for those interested in this role as it provides an overview of the different types of cyber security threats and how to defend against them. Additionally, the course covers the basics of application security and the typical roles needed to support cyber security in an organization.
Information Security Analyst
An Information Security Analyst is responsible for protecting an organization's data and information from unauthorized access, use, disclosure, disruption, modification, or destruction. This course may be useful for those interested in this role as it provides an overview of the different types of cyber security threats and how to defend against them. Additionally, the course covers the basics of application security and the typical roles needed to support cyber security in an organization.
Security Analyst
A Security Analyst is responsible for monitoring and analyzing security events to identify and respond to threats. This course may be helpful for those interested in this role as it provides an overview of the different types of cyber security threats and how to defend against them. Additionally, the course covers the basics of application security and the typical roles needed to support cyber security in an organization.
Cyber Security Specialist
A Cyber Security Specialist is responsible for protecting an organization's computer systems and networks from cyber attacks. This course may be helpful for those interested in this role as it provides an overview of the different types of cyber security threats and how to defend against them. Additionally, the course covers the basics of application security and the typical roles needed to support cyber security in an organization.
Information Security Technician
An Information Security Technician is responsible for implementing and maintaining information security measures for an organization. This course may be useful for those interested in this role as it provides an overview of cyber security essentials, including threats, vulnerabilities, and controls. Additionally, the course covers practical cyber security measures that organizations can use to protect themselves from cyber attacks.
Cyber Security Technician
A Cyber Security Technician is responsible for implementing and maintaining cyber security measures for an organization. This course may be helpful for those interested in this role as it provides an overview of cyber security essentials, including threats, vulnerabilities, and controls. Additionally, the course covers practical cyber security measures that organizations can use to protect themselves from cyber attacks.
Cyber Security Consultant
A Cyber Security Consultant provides advice and guidance to organizations on how to protect themselves from cyber threats. This course may be useful for those interested in this role as it provides an overview of cyber security essentials, including threats, vulnerabilities, and controls. Additionally, the course covers practical cyber security measures that organizations can use to protect themselves from cyber attacks.
Cyber Security Officer
A Cyber Security Officer is responsible for protecting an organization's computer systems and networks from cyber attacks. This course may be useful for those interested in this role as it provides an overview of cyber security essentials, including threats, vulnerabilities, and controls. Additionally, the course covers practical cyber security measures that organizations can use to protect themselves from cyber attacks.
Cyber Security Architect
A Cyber Security Architect designs and implements security measures to protect an organization's computer systems and networks. This course may be useful for those interested in this role as it provides an overview of cyber security essentials, including threats, vulnerabilities, and controls. Additionally, the course covers practical cyber security measures that organizations can use to protect themselves from cyber attacks.

Reading list

We've selected 12 books that we think will supplement your learning. Use these to develop background knowledge, enrich your coursework, and gain a deeper understanding of the topics covered in Cyber Security: Executive Briefing.
Is perfect for providing a comprehensive understanding of cyber security, from its basics to its most advanced concepts. It is well-written and easy to follow, making it a great resource for both beginners and experts alike.
A classic textbook on computer security. covers a wide range of topics, including cryptography, network security, and operating system security.
A comprehensive guide to the insider threat. covers a wide range of topics, including the different types of insider threats, the different ways to prevent insider threats, and the different ways to respond to insider threats.
An excellent resource for learning about the practical aspects of cyber security. covers a wide range of topics, including network security, ethical hacking, and penetration testing.
A comprehensive guide to cyber security for critical infrastructure. covers a wide range of topics, including the different types of cyber threats that critical infrastructure face, the different ways to prevent cyberattacks, and the different ways to respond to cyberattacks.
A comprehensive guide to cyber security for healthcare organizations. covers a wide range of topics, including the different types of cyber threats that healthcare organizations face, the different ways to prevent cyberattacks, and the different ways to respond to cyberattacks.
A comprehensive guide to preparing for the CISSP exam. covers all of the topics that are tested on the exam, and it valuable resource for anyone who wants to pass the CISSP.
Provides a fascinating look at the world of social engineering. It covers a wide range of topics, including phishing, pretexting, and identity theft.
Provides a comprehensive overview of network security assessment. It covers a wide range of topics, including network scanning, vulnerability assessment, and penetration testing.

Share

Help others find this course page by sharing it with your friends and followers:

Similar courses

Here are nine courses similar to Cyber Security: Executive Briefing.
Digital Shield: Cybersecurity for Data and System...
Most relevant
Digital Shield: Cybersecurity for Data and System...
Most relevant
Certificate in Cybersecurity Analysis (IIBA®- CCA):...
Most relevant
Information and Cyber Security Literacy: Governance, Risk...
Most relevant
Digital Shield: Cybersecurity for Data and System...
Most relevant
Industrial Cybersecurity
Security Architecture for CompTIA Security+
Security Architecture and Engineering: Security Controls...
Information and Cyber Security GRC: Compliance Assessment...
Our mission

OpenCourser helps millions of learners each year. People visit us to learn workspace skills, ace their exams, and nurture their curiosity.

Our extensive catalog contains over 50,000 courses and twice as many books. Browse by search, by topic, or even by career interests. We'll match you to the right resources quickly.

Find this site helpful? Tell a friend about us.

Affiliate disclosure

We're supported by our community of learners. When you purchase or subscribe to courses and programs or purchase books, we may earn a commission from our partners.

Your purchases help us maintain our catalog and keep our servers humming without ads.

Thank you for supporting OpenCourser.

© 2016 - 2024 OpenCourser