

Cybersecurity Foundations for Risk Management
- Offered byCoursera
- Public/Government Institute
Cybersecurity Foundations for Risk Management at Coursera Overview
Duration | 8 hours |
Total fee | Free |
Mode of learning | Online |
Difficulty level | Beginner |
Official Website | Explore Free Course |
Credential | Certificate |
Cybersecurity Foundations for Risk Management at Coursera Highlights
- Flexible deadlines Reset deadlines in accordance to your schedule.
- Shareable Certificate Earn a Certificate upon completion
- 100% online Start instantly and learn at your own schedule.
Cybersecurity Foundations for Risk Management at Coursera Course details
- In order to manage the cybersecurity function business, you must first understand its language and its environment. This course covers the foundations of cybersecurity, including threats and vulnerabilities as well as the tools, technologies, and strategies used to manage it.
- After completing this course, a learner will be able to:
- -Define key concepts and terminology in Cybersecurity
- -Identify threats to cybersecurity
- -Identify strategies to identify and remediate vulnerabilities in information assets
- -Identify the systemic components (including personnel) necessary for an effective cybersecurity program
Cybersecurity Foundations for Risk Management at Coursera Curriculum
Welcome to Cybersecurity Foundations for Risk Management (Course 1)
Introduction to Cybersecurity
An Introduction to Cybersecurity (Module 1.1)
The Definition of Cybersecurity
The Definition of Cybersecurity (Lecture 1.1.1)
Key Concepts in Cybersecurity - Part 1 (Lecture 1.1.2)
Key Concepts in Cybersecurity - Part 2 (Lecture 1.1.3)
Wrap-up for Introduction to Cybersecurity
The CIA Triad
The Definition of Cybersecurity (Lesson Quiz 1.1.1)
Key Concepts in Cybersecurity - Part 1 (Quiz 1.1.2)
Key Concepts in Cybersecurity - Part 2 (Quiz 1.1.3)
Quiz for the Introduction to Cybersecurity Module 1.1
Threats to Cybersecurity (Module 1.2)
Threats to Cybersecurity
Compromises to IP, Deviations in QoS, & Espionage or Trespass (Lecture 1.2.1)
Forces of Nature, Human Error or Failure & Information Extortion (Lecture 1.2.2)
Sabotage or Vandalism, Software Attacks & Technical Hardware Failures (Lesson 1.2.3)
Technical Hardware Failure, Technical Software Failure, Technological Obsolescence, and Theft (Lesson 1.2.4)
Threats to Cybersecurity Wrap-up
Threats to Cybersecurity
Compromises to IP, Deviations in QoS, & Espionage or Trespass (Quiz 1.2.1)
Forces of Nature, Human Error or Failure & Information Extortion (Quiz 1.2.2)
Sabotage or vandalism, Software attacks & Technical hardware failures (Quiz 1.2.3)
Technical Hardware Failure, Technical Software Failure, Technological Obsolescence, and Theft (Quiz1.2.4)
Threats to Cybersecurity - Module 1.2 Quiz
Cybersecurity Management (Module 1.3)
Cybersecurity Management
Introduction to Cybersecurity Management
Cybersecurity Roles and Responsibilities
Cybersecurity Governance
Planning for Cybersecurity
Planning for Cybersecurity Contingencies
Cybersecurity Management Conclusion
Introduction to the Management of Cybersecurity - Lesson Quiz
Cybersecurity Roles and Responsibilities - Lesson 1.3.2 Quiz
Cybersecurity Governance - Lesson Quiz
Planning for Cybersecurity (Lesson Quiz 1.3.4)
Planning for Cybersecurity Contingencies (Lesson Quiz 1.3.5)
Cybersecurity Management (Module Quiz 1.3)
Understanding Cybersecurity Risk and Risk Management (Module 1.4)
Understanding Cybersecurity Risk and Risk Management
Understanding Cybersecurity Risk
Understanding Risk Management
Risk Management Team Roles and Responsibilities
Understanding Cybersecurity Risk and Risk Management
Understanding Cybersecurity Risk
Understanding Risk Management (Lesson Quiz 1.4.2)
Risk Management Team Roles and Responsibilities (Lesson Quiz 1.4.3)
Understanding Cybersecurity Risk and Risk Management Module Quiz
Wrap-up for Cybersecurity Foundations for Risk Management
Conclusion of the Course
Final Course Assessment