Infosec - Governance and Strategy
- Offered byCoursera
Governance and Strategy at Coursera Overview
Duration | 5 hours |
Start from | Start Now |
Total fee | Free |
Mode of learning | Online |
Official Website | Explore Free Course |
Credential | Certificate |
Governance and Strategy at Coursera Highlights
- Flexible deadlines Reset deadlines in accordance to your schedule.
- Shareable Certificate Earn a Certificate upon completion
- 100% online Start instantly and learn at your own schedule.
- Course 3 of 3 in the Cybersecurity Leadership and Management Specialization
Governance and Strategy at Coursera Course details
- This course is an introduction and an overview to the basic principles of cybersecurity Governance and Strategy. It provides guidance on determining information security objectives and how to measure progress toward achieving them. It is an exposition on the rationale and necessity for senior management to integrate information security into overall organizational governance at
- the highest levels.
Governance and Strategy at Coursera Curriculum
Introduction to IS Governance (474)
Intro
Governance Overview
Business Goals and Objectives
IS Governance (PDF Handout)
IS Roles and Responsibilities (475)
Roles and Responsibilities
Risk Management and IS Roles and Responsibilities
Third-party Relationships
Information Security Strategy (478)
Effective Metrics
Strategy Development
Strategy Goals, Objectives and Desired State
Current State of Security
Strategy Elements
IS Resources and Constraints (480)
IS Resources
IS Constraints
Implementation Action Plan (484)
Implementation Action Plan Development
IS Program Objectives
Strategy and Implementation (488)
Risk Management Overview
Strategy, communication and risk awareness
Effective information risk management
Risk Management Concepts
Implementing Risk Management
Risk Assessment (494)
Risk Assessment Overview
Risk Assessment Methodology
Asset Classification and Operational Considerations (496)
Asset Classification Overview
BIA Key Metrics
Third Party Service Providers
Integration with Life Cycle Processes
Security Control Baselines
Security Program Architecture (502)
IS Program Development and Management Overview
IS Program Elements
Defining IS Program Objectives
Technology Resources
Scope and Charter
IS Management Framework
IS Management Framework Components
Defining IS Program Road Map
IS Infrastructure and Architecture
Architecture Implementation
Security Program Activities (508)
Management and Administrative Activities
Services and Operational Activities
Effective Incident Management (512)
Incident Management Introduction
Incident Management Overview
Incident Response Procedures
Incident Management Organization
Incident Management Resources
Incident Management Objectives
Metrics and indicators
Defining Incident Management Procedures
IR, BC and DR Planning and Procedures (513)
Current State of IR Capability
Developing an IR Plan
BC and DR Procedures
Testing IR, BC and DR Plans
Executing Response and Recovery Plans
Post-Incident Activities and Investigation
IR and BC Management
Risk Management (413)
Risk Definitions
Risk Frameworks
Risk Assessment
Threats and Threat Agents
Risk Assignment
Threat Modeling
Security Awareness
Due Diligence and Due Care
Vendor Security
Cybersecurity Governance and Strategy