- Level Foundation
- Duration 20 hours
- Course by Royal Holloway, University of London
-
Offered by
About
In this course you will look at some of the key components of practical cyber security management and its governance. This includes what happens when things go wrong, understanding how organisations can respond to incidents, through to the essential role of people in achieving better cyber security outcomes. Together, you will examine how incident management, cyber resilience, and developing an effective appreciation of people, not simply as users but as active participants, can enable better cyber security outcomes. The topics covered include: • Identifying what an incident is • Incident preparation, planning, and response • Cyber resilience • The role of people in security management • The building of trust and developing positive cyber security cultures By completing this course, you will learn how to integrate incident management and a rich knowledge of people into a real-world Information Security Management System for an organisation.Modules
Introduction to the course
1
Discussions
- Getting to know each other
1
Videos
- Introduction to Security Management and Governance
4
Readings
- Course syllabus
- Starting your studies
- Study journal reflection – expectations
- Principles of good peer feedback in peer review assignment
1.0 Introduction to Incident Management and Governance
1
Videos
- Introduction to incident management and response
1.1 What is an incident?
2
Videos
- When things go wrong
- Incident management
2
Readings
- Incident response
- US National Institute of Standards and Technology’s (NIST) 800-61
1.2 Incident preparation
1
Assignment
- End of week 1 quiz
1
Discussions
- The standard processes of incident planning
3
Videos
- Planning for failure
- Developing resilience
- Week 1 summary
1
Readings
- Incident management planning
2.1 Incident response
4
Videos
- Week 2 introduction
- Identifying an incident
- Incident response teams
- Incident response actions
2
Readings
- Activity: Information sharing partnerships
- Security incident management
2.2 Assessing incidents
1
Assignment
- End of week 2 Quiz
1
Discussions
- Digital forensics
3
Videos
- Reporting incidents
- How to learn lessons from incidents
- Week 2 summary
1
Readings
- Lessons learned from an information security incident
3.0 Introduction People and Cyber Security
1
Videos
- Introduction to People and Cyber Security
3.1 Why focus on people?
1
Discussions
- The concept of positive and negative security
2
Videos
- Surely, we know who people are?
- Who and what are we seeking to secure?
1
Readings
- Walking the line: The everyday security ties that bind
3.2 Managing people
1
Assignment
- End of week 3 Quiz
1
Discussions
- People management security controls
4
Videos
- Developing Management Strategies for People
- Vetting and Contracting
- Developing awareness and ‘Good’ practice
- Week 3 summary
1
Readings
- Procedural and people security controls
4.1 Building trust
1
Peer Review
- Trust-Building
3
Videos
- Week 4 introduction
- Why is trust important?
- A trusting organisation
1
Readings
- Trust: An element of information security
4.2 People as the strongest link
1
Discussions
- A technical security control
1
Videos
- A security management ecosystem
1
Readings
- Users are not the enemy
4.3 Developing a people-centric security
1
Assignment
- End of week 4 Quiz
3
Videos
- How does security management change from a people-orientated perspective?
- Aren’t people just really annoying?
- Week 4 summary
1
Readings
- Human factors
Auto Summary
Embark on a comprehensive journey into the realm of cyber security with the "Security Management and Governance" course, crafted specifically for IT and Computer Science enthusiasts. This foundational course, offered by Coursera, delves into the critical aspects of practical cyber security management and governance. You will explore how organizations can effectively respond to incidents and the vital role of people in enhancing cyber security outcomes. Key topics covered in this course include identifying incidents, preparing and planning for incident responses, fostering cyber resilience, understanding the role of individuals in security management, and cultivating trust to develop positive cyber security cultures. By the end of the course, you'll be equipped with the skills to integrate incident management and a deep appreciation of human factors into a robust Information Security Management System for any organization. Designed for those at the foundational level, this course spans 1200 minutes and is available under the Starter subscription plan. Whether you're a budding IT professional or someone looking to strengthen your cyber security acumen, this course provides the essential knowledge and practical insights needed to excel in the field. Join now and take a significant step towards mastering security management and governance.

Andrew Dwyer