- Level Foundation
- Duration 17 hours
- Course by Kennesaw State University
-
Offered by
About
This course intends to make the student familiar with information security management. When you have finished with this course you will know more about: • Governance: including the mission, roles and responsibilities of the InfoSec governance function, and the strategic planning process and InfoSec’s role in the organization’s strategic planning effort. • You will understand the various types of InfoSec policies and how effective information security policy is created and used. • Risk management and the risk management process • Certain laws and ethical issues impacting information security in the organization. And some common information security management practices such as benchmarking and performance measures.Modules
Welcome to the Management of Information Security
1
Assignment
- Pretest: Test your knowledge before you begin
1
Peer Review
- Capstone Project: Getting started
1
Discussions
- What is cybersecurity?
2
Videos
- An overview of this course
- Welcome to security Management
3
Readings
- What is security management?
- Get help and meet other learners in this course. Join your discussion forums!
- Capstone Project: Getting started
Governance and Strategic Planning in Information Security
2
Assignment
- Governance and strategic planning in information security practice quiz
- Governance and strategic planning in information security quiz
1
Peer Review
- Capstone Project: Organizing for cybersecurity
1
Discussions
- Where does the security management team belong?
2
Videos
- How organizations are governed
- Executive viewpoint on governance in cybersecurity
4
Readings
- How organizations structure the security function
- What does the CSO do?
- How organizations make strategic plans for security
- Capstone Project: Organizing for cybersecurity
Risk Management
2
Assignment
- Risk management practice quiz
- Risk management quiz
1
Peer Review
- Capstone Project: Identifying risks
1
Discussions
- Selecting a risk management methodology
3
Videos
- The risk identification process
- The risk assessment process
- Executive viewpoint on risk management methodology
5
Readings
- An overview of the risk management process
- More on identifying and assessing risk
- Determining risk control strategies
- Methods used to implement risk management
- Capstone Project: Identifying risks
Regulatory Compliance, Law and Ethics
2
Assignment
- Regulations, law, ethics, and compliance practice quiz
- Regulations, law, ethics, and compliance
1
Peer Review
- Capstone Project: Ethical decision making
2
Discussions
- Are ethics important on the job?
- Is compliance with the regulations enough to have good security?
2
Videos
- An introduction to law, ethics, and compliance
- Executives viewpoint on implementing compliance programs
4
Readings
- The legal landscape of cybersecurity
- Workplace ethics
- Common processes in cybersecurity programs
- Capstone Project: Ethical decision making
Security Programs
2
Assignment
- Security programs practice quiz
- Security programs
1
Peer Review
- Capstone Project: Assessing an incident response plan
1
Discussions
- What is the most urgent technical control?
1
Videos
- Measuring performance
3
Readings
- Managing technical controls
- Contigency planning including incident response
- Capstone Project: Assessing an incident response plan
Final Specialization Exam
1
Assignment
- Final Exam
1
Peer Review
- Capstone Project: Completion Report
2
Videos
- Executive viewpoint on the importance of cybersecurity
- Pulling it all together
1
Readings
- Capstone Project: Completion Report
Auto Summary
Discover the essential aspects of information security management with "The Business of Cybersecurity Capstone." Offered by Coursera, this foundational course covers governance, policy creation, risk management, legal considerations, and management practices. Perfect for IT and Computer Science enthusiasts, it spans 1020 minutes and is available through Starter and Professional subscriptions. Enhance your cybersecurity knowledge under expert guidance and contribute strategically to your organization's security planning.

Dr. Humayun Zafar, CEH, CISM, CRISC, PCIP

Dr. Traci Carte

Herbert J. Mattord, Ph.D., CISM, CISSP, CDP

Andy Green, Ph.D.

Michael Whitman, Ph.D., CISM, CISSP