Coursera
Coursera Logo

Play It Safe: Manage Security Risks 

  • Offered byCoursera

Play It Safe: Manage Security Risks
 at 
Coursera 
Overview

Duration

12 hours

Start from

Start Now

Total fee

Free

Mode of learning

Online

Difficulty level

Beginner

Official Website

Explore Free Course External Link Icon

Credential

Certificate

Play It Safe: Manage Security Risks
 at 
Coursera 
Highlights

  • Flexible deadlines Reset deadlines in accordance to your schedule.
  • Shareable Certificate Earn a Certificate upon completion
  • 100% online Start instantly and learn at your own schedule.
  • Coursera Labs Includes hands on learning projects. Learn more about Coursera Labs External Link
  • Beginner Level
  • Approx. 12 hours to complete
  • English Subtitles: English
Read more
Details Icon

Play It Safe: Manage Security Risks
 at 
Coursera 
Course details

More about this course
  • This is the second course in the Google Cybersecurity Certificate. These courses will equip you with the skills you need to apply for an entry-level cybersecurity job. You’ll build on your understanding of the topics that were introduced in the first Google Cybersecurity Certificate course.
  • In this course, you will take a deeper dive into concepts introduced in the first course, with an emphasis on how cybersecurity professionals use frameworks and controls to protect business operations. In particular, you'll identify the steps of risk management and explore common threats, risks, and vulnerabilities. Additionally, you'll explore Security Information and Event Management (SIEM) data and use a playbook to respond to identified threats, risks, and vulnerabilities. Finally, you will take an important step towards becoming a cybersecurity professional and practice performing a security audit.
  • Google employees who currently work in cybersecurity will guide you through videos, provide hands-on activities and examples that simulate common cybersecurity tasks, and help you build your skills to prepare for jobs.
  • Learners who complete this certificate will be equipped to apply for entry-level cybersecurity roles. No previous experience is necessary.
  • By the end of this course, you will:
  • - Identify the common threats, risks, and vulnerabilities to business operations.
  • - Understand the threats, risks, and vulnerabilities that entry-level cybersecurity analysts are most focused on.
  • - Comprehend the purpose of security frameworks and controls.
  • - Describe the confidentiality, integrity, and availability (CIA) triad.
  • - Explain the National Institute of Standards and Technology (NIST) framework.
  • - Explore and practice conducting a security audit.
  • - Use a playbook to respond to threats, risks, and vulnerabilities.
Read more

Play It Safe: Manage Security Risks
 at 
Coursera 
Curriculum

Security domains

Introduction to Course 2

Welcome to week 1

Explore the CISSP security domains, Part 1

Explore the CISSP security domains, Part 2

Ashley: My path to cybersecurity

Threats, risks, and vulnerabilities

Key impacts of threats, risks, and vulnerabilities

Herbert: Manage threats, risks, and vulnerabilities

NIST’s Risk Management Framework

Wrap-up

Course 2 overview

Helpful resources and tips

Security domains cybersecurity analysts need to know

Manage common threats, risks, and vulnerabilities

Glossary terms from week 1

Test your knowledge: More about the CISSP security domains

Test your knowledge: Navigate threats, risks, and vulnerabilities

Weekly challenge 1

Security frameworks and controls

Welcome to week 2

Frameworks

Controls

Explore the CIA triad

NIST frameworks

Explore the five functions of the NIST Cybersecurity Framework

OWASP security principles

Wajih: Stay up-to-date on the latest cybersecurity threats

Plan a security audit

Complete a security audit

Wrap-up

The relationship between frameworks and controls

Use the CIA triad to protect organizations

More about OWASP security principles

More about security audits

Portfolio Activity Exemplar: Conduct a security audit, Part 1

Portfolio Activity Exemplar: Conduct a security audit, Part 2

Glossary terms from week 2

Test your knowledge: More about frameworks and controls

Test your knowledge: The CIA triad

Test your knowledge: NIST frameworks

Test your knowledge: OWASP principles and security audits

Portfolio Activity: Conduct a security audit, Part 1

Portfolio Activity: Conduct a security audit, Part 2

Weekly challenge 2

Introduction to cybersecurity tools

Welcome to week 3

Logs and SIEM tools

SIEM dashboards

Parisa: The parallels of accessibility and security

Explore common SIEM tools

Talya: Myths about the cybersecurity field

Wrap-up

The future of SIEM tools

More about cybersecurity tools

Use SIEM tools to protect organizations

Glossary terms from week 3

Test your knowledge: Security information and event management (SIEM) dashboards

Test your knowledge: Identify threats and vulnerabilities with SIEM tools

Weekly challenge 3

Use playbooks to respond to incidents

Welcome to week 4

Phases of an incident response playbook

Use a playbook to respond to threats, risks, or vulnerabilities

Erin: The importance of diversity of perspective on a security team

Wrap-up

Course wrap-up

More about playbooks

Playbooks, SIEM tools, and SOAR tools

Glossary terms from week 4

Course 2 glossary

Get started on the next course

Test your knowledge: Incident response

Test your knowledge: Use a playbook to respond to an incident

Weekly challenge 4

Play It Safe: Manage Security Risks
 at 
Coursera 
Admission Process

    Important Dates

    May 25, 2024
    Course Commencement Date

    Other courses offered by Coursera

    – / –
    3 months
    Beginner
    – / –
    20 hours
    Beginner
    – / –
    2 months
    Beginner
    – / –
    3 months
    Beginner
    View Other 6715 CoursesRight Arrow Icon
    qna

    Play It Safe: Manage Security Risks
     at 
    Coursera 

    Student Forum

    chatAnything you would want to ask experts?
    Write here...