

Our Courses
Cybersecurity Risk Management Framework
Gain a holistic understanding of NIST cybersecurity fundamentals. You will learn about the RMF process and managing risk by identifying, assessing and responding to risk. Additionally, you will learn how to use the framework to assess an organization's cybersecurity risk and the steps to implement or improve a cybersecurity program. You will deep dive in to the NIST 800-171 document where you will learn how to understand each of the 110 requirements and how to satisfy each of them.
-
Course by
-
Self Paced
-
English
Operational Risk Management: Frameworks & Strategies
In the final course from the Risk Management specialization, you will be introduced to the different roles in risk governance and the benefits of establishing an operational risk management program at your own workplace. This course will highlight key elements of an Operational Risk Management framework and help you identify the appropriate elements to incorporate in your own program.
-
Course by
-
Self Paced
-
7 hours
-
English
Cybersecurity Risk Management Frameworks
In this specialization, you will learn how to define Cybersecurity risk and discuss the threats that create it while you also learn to describe the role of Cybersecurity management in the management of Cybersecurity risk. You will go on to understand the elements of a general risk management framework as well as how to develop and administer a risk management effort. Along the way you will learn about the dominant standards and frameworks in risk management, and the tools used to support them.
-
Course by
-
Self Paced
-
English
Dominant Risk Management Standards and Frameworks
Organizations with little experience in risk management will want to look to national and international organizations for guidance in designing and implementing their risk management efforts. There are two dominant organizations that offer guidance in this area: the U.S. National Institute for Standards in Technology (NIST) and the International Standards Organization. This course examines the risk management frameworks and standards offered by these organization and then discusses other available approaches.
-
Course by
-
Self Paced
-
8 hours
-
English
Implementing a Risk Management Framework
The ultimate destination for a security manager is the Chief Information Security Officer (or Chief Security Officer) a senior executive role responsible for all cybersecurity operations in the organization. But how do you get from entry-level IT or security employee to the CISO’s office and what do you need to know when you get there?
-
Course by
-
Self Paced
-
18 hours
-
English
Cybersecurity Policy for Water and Electricity Infrastructures
This course will examine the drinking water and electricity infrastructures, and various policies that have been developed to help guide and strengthen their cybersecurity programs. The drinking water and electricity infrastructures are two of fourteen subsectors comprising what are known as "lifeline infrastructure". The 2013 National Infrastructure Protection Plan identifies four lifeline infrastructure sectors: 1) water, 2) energy, 3) transportation, and 4) communications. These sectors are designated "lifeline" because many other infrastructures depend upon them.
-
Course by
-
Self Paced
-
9 hours
-
English
Risk governance: Manage the risks
All organisations must grapple with fundamental issues at the heart of governance: who are our stakeholders? What are their objectives? How can we ensure these objectives are met as effectively as possible? How can we ensure all legitimate stakeholders are treated fairly? Via structured learning activities (video lectures, quizzes, discussion prompts and written assessments) this course will teach you how to address these questions and how a sound governance structure and comprehensive risk management framework can support you and your organisation in achieving its objectives.
-
Course by
-
Self Paced
-
24 hours
-
English
NIST DoD RMF
The Risk Management Framework (RMF) provides a disciplined, structured and flexible process for managing security and privacy risk. It includes information security categorization; control selection, implementation and assessment; system and common control authorizations; and continuous monitoring. It includes activities to prepare organizations to execute the framework at appropriate risk management levels.
-
Course by
-
Self Paced
-
4 hours
-
English
Design and Analyze Secure Networked Systems
In this MOOC, we will learn the basic cyber security concepts, how to identify vulnerabilities/threat in a network system. We will apply CIA basic security services in the triage of recent cyberattack incidents, such as OPM data breach. We will learn the risk management framework for analyzing the risks in a network system, and apply the basic security design principles to protect the data and secure computer systems. We will examine the trustworthiness of programs and data installed in our systems and show the proper way to verify their integrity and authenticity.
-
Course by
-
Self Paced
-
17 hours
-
English