In order to manage the cybersecurity function business, you must first understand its language and its environment. This course covers the foundations of cybersecurity, including threats and vulnerabilities as well as the tools, technologies, and strategies used to manage it.



Cybersecurity Foundations for Risk Management
This course is part of Cybersecurity Risk Management Frameworks Specialization


Instructors: Herbert J. Mattord, Ph.D., CISM, CISSP, CDP
Access provided by New York State Department of Labor
5,441 already enrolled
(115 reviews)
What you'll learn
Define key concepts and terminology in Cybersecurity
Identify threats to cybersecurity
Describe the role and responsibilities of Cybersecurity management in the risk management effort
Explain Cybersecurity risk and the organizational program to manage it
Skills you'll gain
- Cyber Threat Intelligence
- Threat Management
- Information Systems Security
- Cyber Attacks
- Security Awareness
- Cyber Operations
- Cyber Security Policies
- Cyber Governance
- Cybersecurity
- Cyber Risk
- Incident Response
- Network Security
- Risk Analysis
- Cyber Security Strategy
- Risk Management
- Computer Security Incident Management
- Vulnerability Management
- Vulnerability Assessments
- Threat Detection
- Security Management
Details to know

Add to your LinkedIn profile
20 assignments
See how employees at top companies are mastering in-demand skills

Build your subject-matter expertise
- Learn new concepts from industry experts
- Gain a foundational understanding of a subject or tool
- Develop job-relevant skills with hands-on projects
- Earn a shareable career certificate


Earn a career certificate
Add this credential to your LinkedIn profile, resume, or CV
Share it on social media and in your performance review

There are 6 modules in this course
This is an overview of the learning objectives for the course.
What's included
1 video1 reading
What's included
5 videos1 reading4 assignments
Learning objectives for Threats to Cybersecurity
What's included
6 videos1 reading5 assignments
What's included
7 videos6 assignments
Learning objectives for Managing Vulnerabilities in Information Assets module
What's included
5 videos4 assignments
This is the final module where you will take the Course Assessment.
What's included
1 video1 assignment
Instructors


Offered by
Why people choose Coursera for their career




Learner reviews
115 reviews
- 5 stars
79.13%
- 4 stars
13.04%
- 3 stars
5.21%
- 2 stars
1.73%
- 1 star
0.86%
Showing 3 of 115
Reviewed on Nov 14, 2022
I am very excited to complete the course and hope it will take me to a greater level!!!
Reviewed on Mar 10, 2022
Wonderful course ,very well crafted However covered only basic level concepts. Quizes were very simple and maximum questions were repeated in final quiz again
Reviewed on Jun 13, 2022
KEEP IT UP YOUR PRESENTAION AND COURSE QUIZES ARE SO GOOD
Recommended if you're interested in Information Technology
Kennesaw State University
Kennesaw State University
Infosec

Open new doors with Coursera Plus
Unlimited access to 10,000+ world-class courses, hands-on projects, and job-ready certificate programs - all included in your subscription
Advance your career with an online degree
Earn a degree from world-class universities - 100% online
Join over 3,400 global companies that choose Coursera for Business
Upskill your employees to excel in the digital economy