In order to manage the cybersecurity function business, you must first understand its language and its environment. This course covers the foundations of cybersecurity, including threats and vulnerabilities as well as the tools, technologies, and strategies used to manage it.
![Kennesaw State University](https://d3njjcbhbojbot.cloudfront.net/api/utilities/v1/imageproxy/http://coursera-university-assets.s3.amazonaws.com/ed/49a1a1d099419e9172fcb3d4c3177a/Square.png?auto=format%2Ccompress&dpr=1&w=28&h=28)
![](https://d3njjcbhbojbot.cloudfront.net/api/utilities/v1/imageproxy/https://coursera_assets.s3.amazonaws.com/images/1a4589dccee10648821b7ea23e5fca9a.png?auto=format%2Ccompress&dpr=1&q=80)
![Kennesaw State University](https://d3njjcbhbojbot.cloudfront.net/api/utilities/v1/imageproxy/http://coursera-university-assets.s3.amazonaws.com/18/62f229832049dc9e428519d5ff5c55/Medium-rectangle.png?auto=format%2Ccompress&dpr=1&h=45)
The Foundations of Cybersecurity
This course is part of Managing Cybersecurity Specialization
![Herbert J. Mattord, Ph.D., CISM, CISSP, CDP](https://d3njjcbhbojbot.cloudfront.net/api/utilities/v1/imageproxy/https://coursera-instructor-photos.s3.amazonaws.com/f2/f32d60f80b11e5843e959aa5537a3f/Herbert-Mattord-Univ-Rel-Picture-2-SQUARE.jpg?auto=format%2Ccompress&dpr=1&w=75&h=75&fit=crop)
![Michael Whitman, Ph.D., CISM, CISSP](https://d3njjcbhbojbot.cloudfront.net/api/utilities/v1/imageproxy/https://coursera-instructor-photos.s3.amazonaws.com/ae/8afaa04f3a11e695bf657b34037bfa/Mike-Whitman.jpg?auto=format%2Ccompress&dpr=1&w=75&h=75&fit=crop)
Instructors: Herbert J. Mattord, Ph.D., CISM, CISSP, CDP
Sponsored by Coursera Learning Team
27,770 already enrolled
(677 reviews)
What you'll learn
Define key concepts and terminology in Cybersecurity
Describe key threats to cybersecurity
Define strategies to identify and remediate vulnerabilities in information assets
Give examples of the systemic components (including personnel) necessary for an effective cybersecurity program
Skills you'll gain
Details to know
![](https://d3njjcbhbojbot.cloudfront.net/api/utilities/v1/imageproxy/https://coursera_assets.s3.amazonaws.com/images/31ebcba3851b87d1d8609abf15d0ff7e.png?auto=format%2Ccompress&dpr=1&w=24&h=24)
Add to your LinkedIn profile
24 assignments
See how employees at top companies are mastering in-demand skills
![Placeholder](https://d3njjcbhbojbot.cloudfront.net/api/utilities/v1/imageproxy/https://coursera_assets.s3.amazonaws.com/images/74c8747e8210831049cf88dd4eefe26c.png?auto=format%2Ccompress&dpr=2&blur=200&px=8&max-w=320)
Build your subject-matter expertise
- Learn new concepts from industry experts
- Gain a foundational understanding of a subject or tool
- Develop job-relevant skills with hands-on projects
- Earn a shareable career certificate
![Placeholder](https://d3njjcbhbojbot.cloudfront.net/api/utilities/v1/imageproxy/https://coursera_assets.s3.amazonaws.com/images/a7c5400e51272c78b710ce9b56fd3178.png?auto=format%2Ccompress&dpr=2&blur=200&px=8&max-w=562)
![Placeholder](https://d3njjcbhbojbot.cloudfront.net/api/utilities/v1/imageproxy/https://coursera_assets.s3.amazonaws.com/images/de1a6556fbe605411e8c1c2ca4ba45f1.png?auto=format%2Ccompress&dpr=2&blur=200&px=8&max-w=259)
Earn a career certificate
Add this credential to your LinkedIn profile, resume, or CV
Share it on social media and in your performance review
![Placeholder](https://d3njjcbhbojbot.cloudfront.net/api/utilities/v1/imageproxy/https://coursera_assets.s3.amazonaws.com/images/de1a6556fbe605411e8c1c2ca4ba45f1.png?auto=format%2Ccompress&dpr=2&blur=200&px=8&max-w=333)
There are 7 modules in this course
This is an overview of the learning objectives for the course.
What's included
1 video
Learning Objectives for Introduction to Cybersecurity Module
What's included
5 videos2 readings4 assignments
Learning objectives for Threats to Cybersecurity
What's included
6 videos1 reading5 assignments
What's included
6 videos1 reading5 assignments
Learning objectives for Managing Vulnerabilities in Information Assets module
What's included
6 videos1 reading5 assignments
Learning Objectives for Managing Vulnerabilities in Information Assets Module
What's included
5 videos1 reading4 assignments
What's included
1 video1 assignment
Instructors
![Herbert J. Mattord, Ph.D., CISM, CISSP, CDP](https://d3njjcbhbojbot.cloudfront.net/api/utilities/v1/imageproxy/https://coursera-instructor-photos.s3.amazonaws.com/f2/f32d60f80b11e5843e959aa5537a3f/Herbert-Mattord-Univ-Rel-Picture-2-SQUARE.jpg?auto=format%2Ccompress&dpr=1&w=75&h=75&fit=crop)
![Michael Whitman, Ph.D., CISM, CISSP](https://d3njjcbhbojbot.cloudfront.net/api/utilities/v1/imageproxy/https://coursera-instructor-photos.s3.amazonaws.com/ae/8afaa04f3a11e695bf657b34037bfa/Mike-Whitman.jpg?auto=format%2Ccompress&dpr=1&w=75&h=75&fit=crop)
Offered by
Why people choose Coursera for their career
![](https://d3njjcbhbojbot.cloudfront.net/api/utilities/v1/imageproxy/https://coursera_assets.s3.amazonaws.com/growth_testimonials/passionate_learner/Felipe_Moitta.png?auto=format%2Ccompress&dpr=1&w=64&h=64&fit=crop)
![](https://d3njjcbhbojbot.cloudfront.net/api/utilities/v1/imageproxy/https://coursera_assets.s3.amazonaws.com/growth_testimonials/passionate_learner/Jennifer_John.png?auto=format%2Ccompress&dpr=1&w=64&h=64&fit=crop)
![](https://d3njjcbhbojbot.cloudfront.net/api/utilities/v1/imageproxy/https://coursera_assets.s3.amazonaws.com/growth_testimonials/passionate_learner/Larry_Tao_Wang_1.png?auto=format%2Ccompress&dpr=1&w=64&h=64&fit=crop)
![](https://d3njjcbhbojbot.cloudfront.net/api/utilities/v1/imageproxy/https://coursera_assets.s3.amazonaws.com/growth_testimonials/passionate_learner/Chaitanya_Anand.png?auto=format%2Ccompress&dpr=1&w=64&h=64&fit=crop)
Learner reviews
677 reviews
- 5 stars
81.02%
- 4 stars
16.61%
- 3 stars
1.76%
- 2 stars
0%
- 1 star
0.58%
Showing 3 of 677
Reviewed on Sep 5, 2020
This is a great basic course for those without a lot of technical knowledge. It gives a good overview of cybersecurity practices in a large or medium-size organization.
Reviewed on Jun 1, 2024
Thanks for this great program and the good opportunity being given to me I appreciate and tell me Federal government for this kind gesture
Reviewed on Jul 25, 2020
Good foundational course at the right pace. Noticed several mistakes (incorrect choices marked correct) in the final quiz! I hope the instructors are able to correct these small errors.
Recommended if you're interested in Information Technology
Kennesaw State University
Infosec
![Placeholder](https://d3njjcbhbojbot.cloudfront.net/api/utilities/v1/imageproxy/https://coursera_assets.s3.amazonaws.com/images/7a1c0e2e779c1ff27cae62480adfe003.png?auto=format%2Ccompress&dpr=2&blur=200&px=8&max-w=120)
Open new doors with Coursera Plus
Unlimited access to 10,000+ world-class courses, hands-on projects, and job-ready certificate programs - all included in your subscription
Advance your career with an online degree
Earn a degree from world-class universities - 100% online
Join over 3,400 global companies that choose Coursera for Business
Upskill your employees to excel in the digital economy