Coursera
Coursera Logo

The GRC Approach to Managing Cybersecurity 

  • Offered byCoursera

The GRC Approach to Managing Cybersecurity
 at 
Coursera 
Overview

Duration

10 hours

Start from

Start Now

Total fee

Free

Mode of learning

Online

Difficulty level

Beginner

Official Website

Explore Free Course External Link Icon

Credential

Certificate

The GRC Approach to Managing Cybersecurity
 at 
Coursera 
Highlights

  • This Course Plus the Full Specialization.
  • Shareable Certificates.
  • Graded Programming Assignments.
Details Icon

The GRC Approach to Managing Cybersecurity
 at 
Coursera 
Course details

More about this course
  • Managing cybersecurity is about managing risk, specifically the risk to information assets of valued by an organization. This course examines the role of Governance, Risk Management, and Compliance (GRC) as part of the Cybersecurity management process, including key functions of planning, policies, and the administration of technologies to support the protection of critical information assets.
  • In this course, a learner will be able to:
  • ? Identify the importance and functions of Governance, Risk Management, and Compliance in Cybersecurity program management.
  • ? Describe best practices in risk management including the domains of risk assessment and risk treatment.
  • ? Describe the structure and content of Cybersecurity-related strategy, plans, and planning
  • ? Identify the key components and methodologies of Cybersecurity policies and policy development
  • ? Discuss the role of performance measures as a method to assess and improve GRC programs
Read more

The GRC Approach to Managing Cybersecurity
 at 
Coursera 
Curriculum

Welcome to The GRC Approach to Managing Cybersecurity (Course 2)

The GRC Approach to Managing Cybersecurity

What is GRC

Introduction to the Management of Cybersecurity (Module 2.1)

Welcome to the GRC Approach to Managing Cybersecurity

What is the Management of Cybersecurity? (Lesson 2.1.1)

Positioning the Cybersecurity Department (Lesson 2.1.2)

Cybersecurity Personnel: Roles and Responsibilities (Lesson 2.1.3)

The CyberSETA Program (Lesson 2.1.4)

Cybersecurity & Personnel Issues (Lesson 2.1.5)

The GRC Approach to Managing Cybersecurity

Information Security Management

What is the Management of Cybersecurity?

Positioning the Cybersecurity Department

Cybersecurity Personnel

The CyberSETA Program

Cybersecurity & Personnel Issues

Introduction to the Management of Cybersecurity

Cybersecurity Governance and Planning (Module 2.2)

Cybersecurity Governance and Planning

What is Cybersecurity Governance? (Lesson 2.2.1)

Cybersecurity Strategic Planning

Cybersecurity Planning for Contingencies (Lesson 2.2.3)

Planning for the Cybersecurity Program (Lesson 2.2.4)

Wrap up for Cybersecurity Governance and Planning

Strategic Planning

What is Cybersecurity Governance?

Cybersecurity Strategic Planning

Cybersecurity Planning for Contingencies

Planning for the Cybersecurity Program

Wrap up for Cybersecurity Governance and Planning

Cybersecurity Risk Management (Module 2.3)

Cybersecurity Risk Management

What is Risk Management?

Risk Management: Models and Methodologies

Preparation for Risk Management

Risk Assessment

Risk Treatment

Wrap Up for Cybersecurity Risk Management

Risk Management

What is Risk Management?

Risk Management: Models and Methodologies

Preparation for Risk Management

Risk Assessment

Risk Treatment

Wrap Up for Cybersecurity Risk Management

Cybersecurity Policy (Module 2.4)

Cybersecurity Policy

Enterprise Cybersecurity Policy

Issue Specific Cybersecurity Policies

System Specific Security Policies

Developing and Implementing Effective Cybersecurity Policy

Cybersecurity Policy

Policy, Standards, and Practices

Enterprise Cybersecurity Policy

Issue Specific Cybersecurity Policies

System Specific Security Policies

Developing and Implementing Effective Cybersecurity Policy

Cybersecurity Policy

Measuring Success in the Cybersecurity Program (Module 2.5)

Welcome to Performance Measures - Measuring Success in the Cybersecurity Program

What are Performance Measures?

Specifying Cybersecurity Measurements

Implementing the Cybersecurity Performance Measures Program

Wrap up for Performance Measures - Measuring Success in the Cybersecurity Program

Information Security Performance Measurement

What are Performance Measures?

Specifying Cybersecurity Measurements

Implementing the Cybersecurity Performance Measures Program

Wrap up for Performance Measures - Measuring Success in the Cybersecurity Program

Law and Regulation in Cybersecurity (Module 2.6)

Law and Regulation in Cybersecurity

Introduction to Key Security Laws

Privacy Laws

US and International Security Laws and Standards

Wrap up for Law and Regulation in Cybersecurity

Information Security and Law

Introduction to Key Security Laws

Privacy Laws

US and International Security Laws and Standards

Wrap up for Law and Regulation in Cybersecurity

Wrap-Up to the course 'The GRC Approach to Managing Cybersecurity'

Course Wrap-up on The GRC Approach to Managing Cybersecurity

Course Exam

The GRC Approach to Managing Cybersecurity
 at 
Coursera 
Admission Process

    Important Dates

    May 25, 2024
    Course Commencement Date

    Other courses offered by Coursera

    – / –
    3 months
    Beginner
    – / –
    20 hours
    Beginner
    – / –
    2 months
    Beginner
    – / –
    3 months
    Beginner
    View Other 6715 CoursesRight Arrow Icon
    qna

    The GRC Approach to Managing Cybersecurity
     at 
    Coursera 

    Student Forum

    chatAnything you would want to ask experts?
    Write here...