- Level Foundation
- Duration 11 hours
- Course by Kennesaw State University
-
Offered by
About
Managing cybersecurity is about managing risk, specifically the risk to information assets of valued by an organization. This course examines the role of Governance, Risk Management, and Compliance (GRC) as part of the Cybersecurity management process, including key functions of planning, policies, and the administration of technologies to support the protection of critical information assets. In this course, a learner will be able to: ● Identify the importance and functions of Governance, Risk Management, and Compliance in Cybersecurity program management. ● Describe best practices in risk management including the domains of risk assessment and risk treatment. ● Describe the structure and content of Cybersecurity-related strategy, plans, and planning ● Identify the key components and methodologies of Cybersecurity policies and policy development ● Discuss the role of performance measures as a method to assess and improve GRC programsModules
The GRC Approach to Managing Cybersecurity
1
Videos
- The GRC Approach to Managing Cybersecurity
2
Readings
- What is GRC
- Get help and meet other learners. Join your Community!
Welcome
1
Videos
- Welcome to the GRC Approach to Managing Cybersecurity
1
Readings
- Information Security Management
What is the Management of Cybersecurity? (Lesson 2.1.1)
1
Assignment
- What is the Management of Cybersecurity?
1
Videos
- What is the Management of Cybersecurity? (Lesson 2.1.1)
Positioning the Cybersecurity Department (Lesson 2.1.2)
1
Assignment
- Positioning the Cybersecurity Department
1
Videos
- Positioning the Cybersecurity Department (Lesson 2.1.2)
Cybersecurity Personnel: Roles and Responsibilities (Lesson 2.1.3)
1
Assignment
- Cybersecurity Personnel
1
Videos
- Cybersecurity Personnel: Roles and Responsibilities (Lesson 2.1.3)
The CyberSETA Program (Lesson 2.1.4)
1
Assignment
- The CyberSETA Program
1
Videos
- The CyberSETA Program (Lesson 2.1.4)
Cybersecurity & Personnel Issues (Lesson 2.1.5)
1
Assignment
- Cybersecurity & Personnel Issues
1
Videos
- Cybersecurity & Personnel Issues (Lesson 2.1.5)
Cybersecurity Management, Explained
1
Assignment
- Introduction to the Management of Cybersecurity
1
Videos
- The GRC Approach to Managing Cybersecurity
Welcome
1
Videos
- Cybersecurity Governance and Planning
1
Readings
- Strategic Planning
What is Cybersecurity Governance? (Lesson 2.2.1)
1
Assignment
- What is Cybersecurity Governance?
1
Videos
- What is Cybersecurity Governance? (Lesson 2.2.1)
Cybersecurity Strategic Planning (Lesson 2.2.2)
1
Assignment
- Cybersecurity Strategic Planning
1
Videos
- Cybersecurity Strategic Planning
Cybersecurity Planning for Contingencies (Lesson 2.2.3)
1
Assignment
- Cybersecurity Planning for Contingencies
1
Videos
- Cybersecurity Planning for Contingencies (Lesson 2.2.3)
Planning for the Cybersecurity Program (Lesson 2.2.4)
1
Assignment
- Planning for the Cybersecurity Program
1
Videos
- Planning for the Cybersecurity Program (Lesson 2.2.4)
Wrap up for Cybersecurity Governance and Planning
1
Assignment
- Wrap up for Cybersecurity Governance and Planning
1
Videos
- Wrap up for Cybersecurity Governance and Planning
Welcome
1
Videos
- Cybersecurity Risk Management
1
Readings
- Risk Management
What is Risk Management? (Lesson 2.3.1)
1
Assignment
- What is Risk Management?
1
Videos
- What is Risk Management?
Risk Management: Models and Methodologies (Lesson 2.3.2)
1
Assignment
- Risk Management: Models and Methodologies
1
Videos
- Risk Management: Models and Methodologies
Preparation for Risk Management (Lesson 2.3.3)
1
Assignment
- Preparation for Risk Management
1
Videos
- Preparation for Risk Management
Risk Assessment (Lesson 2.3.4)
1
Assignment
- Risk Assessment
1
Videos
- Risk Assessment
Risk Treatment (Lesson 2.3.5)
1
Assignment
- Risk Treatment
1
Videos
- Risk Treatment
Wrap Up for Cybersecurity Risk Management
1
Assignment
- Wrap Up for Cybersecurity Risk Management
1
Videos
- Wrap Up for Cybersecurity Risk Management
Welcome to Cybersecurity Policy
1
Videos
- Cybersecurity Policy
1
Readings
- Policy, Standards, and Practices
Enterprise Cybersecurity Policy (Lesson 2.4.1)
1
Assignment
- Enterprise Cybersecurity Policy
1
Videos
- Enterprise Cybersecurity Policy
Issue Specific Cybersecurity Policies (Lesson 2.4.2)
1
Assignment
- Issue Specific Cybersecurity Policies
1
Videos
- Issue Specific Cybersecurity Policies
System Specific Security Policies (Lesson 2.4.3)
1
Assignment
- System Specific Security Policies
1
Videos
- System Specific Security Policies
Developing and Implementing Effective Cybersecurity Policy (Lesson 2.4.4)
1
Assignment
- Developing and Implementing Effective Cybersecurity Policy
1
Videos
- Developing and Implementing Effective Cybersecurity Policy
Wrap up for Cybersecurity Policy
1
Assignment
- Cybersecurity Policy
1
Videos
- Cybersecurity Policy
Welcome to Performance Measures - Measuring Success in the Cybersecurity Program
1
Videos
- Welcome to Performance Measures - Measuring Success in the Cybersecurity Program
1
Readings
- Information Security Performance Measurement
What are Performance Measures? (Lesson 2.5.1)
1
Assignment
- What are Performance Measures?
1
Videos
- What are Performance Measures?
Specifying Cybersecurity Measurements (Lesson 2.5.2)
1
Assignment
- Specifying Cybersecurity Measurements
1
Videos
- Specifying Cybersecurity Measurements
Implementing the Cybersecurity Performance Measures Program (Lesson 2.5.3)
1
Assignment
- Implementing the Cybersecurity Performance Measures Program
1
Videos
- Implementing the Cybersecurity Performance Measures Program
Wrap up for Performance Measures - Measuring Success in the Cybersecurity Program
1
Assignment
- Wrap up for Performance Measures - Measuring Success in the Cybersecurity Program
1
Videos
- Wrap up for Performance Measures - Measuring Success in the Cybersecurity Program
Welcome to Law and Regulation in Cybersecurity
1
Videos
- Law and Regulation in Cybersecurity
1
Readings
- Information Security and Law
Introduction to Key Security Laws (Lesson 2.6.1)
1
Assignment
- Introduction to Key Security Laws
1
Videos
- Introduction to Key Security Laws
Privacy Laws (Lesson 2.6.2)
1
Assignment
- Privacy Laws
1
Videos
- Privacy Laws
US and International Security Laws and Standards (Lesson 2.6.3)
1
Assignment
- US and International Security Laws and Standards
1
Videos
- US and International Security Laws and Standards
Wrap up for Law and Regulation in Cybersecurity
1
Assignment
- Wrap up for Law and Regulation in Cybersecurity
1
Videos
- Wrap up for Law and Regulation in Cybersecurity
Course Wrap Up
1
Assignment
- Course Exam
1
Videos
- Course Wrap-up on The GRC Approach to Managing Cybersecurity
Auto Summary
"The GRC Approach to Managing Cybersecurity" is a foundational IT & Computer Science course offered by Coursera. It focuses on the Governance, Risk Management, and Compliance (GRC) aspects of cybersecurity. Learners will explore risk management best practices, strategy planning, policy development, and performance measures. This 660-minute course is perfect for beginners and is available through Starter and Professional subscriptions.

Herbert J. Mattord, Ph.D., CISM, CISSP, CDP

Michael Whitman, Ph.D., CISM, CISSP