- Level Foundation
- المدة 8 ساعات hours
- الطبع بواسطة Kennesaw State University
-
Offered by
عن
In order to manage the cybersecurity function business, you must first understand its language and its environment. This course covers the foundations of cybersecurity, including threats and vulnerabilities as well as the tools, technologies, and strategies used to manage it. After completing this course, a learner will be able to: ● Define key concepts and terminology in Cybersecurity ● Identify threats to cybersecurity ● Identify strategies to identify and remediate vulnerabilities in information assets ● Identify the systemic components (including personnel) necessary for an effective cybersecurity programالوحدات
Welcome to Cybersecurity Foundations for Risk Management
1
Videos
- Introduction to Cybersecurity
1
Readings
- Get help and meet other learners. Join your Community!
Defining Cybersecurity (Introduction to Module 1)
1
Videos
- The Definition of Cybersecurity
1
Readings
- The CIA Triad
The Definition of Cybersecurity (Lesson 1.1)
1
Assignment
- The Definition of Cybersecurity (Lesson Quiz 1.1.1)
1
Videos
- The Definition of Cybersecurity (Lecture 1.1.1)
Key Terms in Cybersecurity - Part 1 (Lesson 1.2)
1
Assignment
- Key Concepts in Cybersecurity - Part 1 (Quiz 1.1.2)
1
Videos
- Key Concepts in Cybersecurity - Part 1 (Lecture 1.1.2)
Key Terms in Cybersecurity - Part 2 (Lesson 1.3)
1
Assignment
- Key Concepts in Cybersecurity - Part 2 (Quiz 1.1.3)
1
Videos
- Key Concepts in Cybersecurity - Part 2 (Lecture 1.1.3)
Wrap-up for Introduction to Cybersecurity
1
Assignment
- Quiz for the Introduction to Cybersecurity Module 1.1
1
Videos
- Wrap-up for Introduction to Cybersecurity
Welcome for Threats to Cybersecurity
1
Videos
- Threats to Cybersecurity
1
Readings
- Threats to Cybersecurity
Compromises to IP, Deviations in QoS, & Espionage or Trespass (Lesson 1.2.1)
1
Assignment
- Compromises to IP, Deviations in QoS, & Espionage or Trespass (Quiz 1.2.1)
1
Videos
- Compromises to IP, Deviations in QoS, & Espionage or Trespass (Lecture 1.2.1)
Forces of Nature, Human Error or Failure & Information Extortion (Lesson 1.2.2)
1
Assignment
- Forces of Nature, Human Error or Failure & Information Extortion (Quiz 1.2.2)
1
Videos
- Forces of Nature, Human Error or Failure & Information Extortion (Lecture 1.2.2)
Sabotage or Vandalism, Software Attacks & Technical Hardware Failures (Lesson 1.2.3)
1
Assignment
- Sabotage or vandalism, Software attacks & Technical hardware failures (Quiz 1.2.3)
1
Videos
- Sabotage or Vandalism, Software Attacks & Technical Hardware Failures (Lesson 1.2.3)
Technical Hardware Failure, Technical Software Failure, Technological Obsolescence, and Theft (Lesson 1.2.4)
1
Assignment
- Technical Hardware Failure, Technical Software Failure, Technological Obsolescence, and Theft (Quiz1.2.4)
1
Videos
- Technical Hardware Failure, Technical Software Failure, Technological Obsolescence, and Theft (Lesson 1.2.4)
Wrap-up for Threats to Cybersecurity
1
Assignment
- Threats to Cybersecurity - Module 1.2 Quiz
1
Videos
- Threats to Cybersecurity Wrap-up
Welcome for Cybersecurity Management (Module 1.3)
1
Videos
- Cybersecurity Management
Introduction to the Management of Cybersecurity (Lesson 1.3.1)
1
Assignment
- Introduction to the Management of Cybersecurity - Lesson Quiz
1
Videos
- Introduction to Cybersecurity Management
Cybersecurity Personnel: Roles and Responsibilities (Lesson 1.3.2)
1
Assignment
- Cybersecurity Roles and Responsibilities - Lesson 1.3.2 Quiz
1
Videos
- Cybersecurity Roles and Responsibilities
Cybersecurity Governance (Lesson 1.3.3)
1
Assignment
- Cybersecurity Governance - Lesson Quiz
1
Videos
- Cybersecurity Governance
Planning for Cybersecurity (Lesson 1.3.4)
1
Assignment
- Planning for Cybersecurity (Lesson Quiz 1.3.4)
1
Videos
- Planning for Cybersecurity
Planning for Cybersecurity Contingencies (Module 1.3.5)
1
Assignment
- Planning for Cybersecurity Contingencies (Lesson Quiz 1.3.5)
1
Videos
- Planning for Cybersecurity Contingencies
Wrap-up for Cybersecurity Management Module
1
Assignment
- Cybersecurity Management (Module Quiz 1.3)
1
Videos
- Cybersecurity Management Conclusion
Welcome Module 1.4
1
Videos
- Understanding Cybersecurity Risk and Risk Management
Understanding Cybersecurity Risk (Lesson 1.4.1)
1
Assignment
- Understanding Cybersecurity Risk
1
Videos
- Understanding Cybersecurity Risk
Understanding Risk Management (Lesson 1.4.2)
1
Assignment
- Understanding Risk Management (Lesson Quiz 1.4.2)
1
Videos
- Understanding Risk Management
Risk Management Roles and Responsibilities (Lesson 1.4.3)
1
Assignment
- Risk Management Team Roles and Responsibilities (Lesson Quiz 1.4.3)
1
Videos
- Risk Management Team Roles and Responsibilities
Wrap-up for Understanding Cybersecurity Risk and Risk Management
1
Assignment
- Understanding Cybersecurity Risk and Risk Management Module Quiz
1
Videos
- Understanding Cybersecurity Risk and Risk Management
Wrap-up for the course Cybersecurity Foundations for Risk Management
1
Assignment
- Final Course Assessment
1
Videos
- Conclusion of the Course
Auto Summary
"Cybersecurity Foundations for Risk Management" is an essential course for anyone in IT & Computer Science looking to grasp the basics of cybersecurity. Taught by experts at Coursera, this foundational course spans 480 minutes and offers in-depth knowledge on threats, vulnerabilities, and effective management strategies. Ideal for beginners, it covers key concepts, threat identification, and remediation techniques. Available through Starter and Professional subscriptions, it’s perfect for those aiming to build a robust cybersecurity program.

Herbert J. Mattord, Ph.D., CISM, CISSP, CDP

Michael Whitman, Ph.D., CISM, CISSP