The GRC Approach to Managing Cybersecurity
- Offered byCoursera
The GRC Approach to Managing Cybersecurity at Coursera Overview
Duration | 10 hours |
Start from | Start Now |
Total fee | Free |
Mode of learning | Online |
Difficulty level | Beginner |
Official Website | Explore Free Course |
Credential | Certificate |
The GRC Approach to Managing Cybersecurity at Coursera Highlights
- This Course Plus the Full Specialization.
- Shareable Certificates.
- Graded Programming Assignments.
The GRC Approach to Managing Cybersecurity at Coursera Course details
- Managing cybersecurity is about managing risk, specifically the risk to information assets of valued by an organization. This course examines the role of Governance, Risk Management, and Compliance (GRC) as part of the Cybersecurity management process, including key functions of planning, policies, and the administration of technologies to support the protection of critical information assets.
- In this course, a learner will be able to:
- ? Identify the importance and functions of Governance, Risk Management, and Compliance in Cybersecurity program management.
- ? Describe best practices in risk management including the domains of risk assessment and risk treatment.
- ? Describe the structure and content of Cybersecurity-related strategy, plans, and planning
- ? Identify the key components and methodologies of Cybersecurity policies and policy development
- ? Discuss the role of performance measures as a method to assess and improve GRC programs
The GRC Approach to Managing Cybersecurity at Coursera Curriculum
Welcome to The GRC Approach to Managing Cybersecurity (Course 2)
The GRC Approach to Managing Cybersecurity
What is GRC
Introduction to the Management of Cybersecurity (Module 2.1)
Welcome to the GRC Approach to Managing Cybersecurity
What is the Management of Cybersecurity? (Lesson 2.1.1)
Positioning the Cybersecurity Department (Lesson 2.1.2)
Cybersecurity Personnel: Roles and Responsibilities (Lesson 2.1.3)
The CyberSETA Program (Lesson 2.1.4)
Cybersecurity & Personnel Issues (Lesson 2.1.5)
The GRC Approach to Managing Cybersecurity
Information Security Management
What is the Management of Cybersecurity?
Positioning the Cybersecurity Department
Cybersecurity Personnel
The CyberSETA Program
Cybersecurity & Personnel Issues
Introduction to the Management of Cybersecurity
Cybersecurity Governance and Planning (Module 2.2)
Cybersecurity Governance and Planning
What is Cybersecurity Governance? (Lesson 2.2.1)
Cybersecurity Strategic Planning
Cybersecurity Planning for Contingencies (Lesson 2.2.3)
Planning for the Cybersecurity Program (Lesson 2.2.4)
Wrap up for Cybersecurity Governance and Planning
Strategic Planning
What is Cybersecurity Governance?
Cybersecurity Strategic Planning
Cybersecurity Planning for Contingencies
Planning for the Cybersecurity Program
Wrap up for Cybersecurity Governance and Planning
Cybersecurity Risk Management (Module 2.3)
Cybersecurity Risk Management
What is Risk Management?
Risk Management: Models and Methodologies
Preparation for Risk Management
Risk Assessment
Risk Treatment
Wrap Up for Cybersecurity Risk Management
Risk Management
What is Risk Management?
Risk Management: Models and Methodologies
Preparation for Risk Management
Risk Assessment
Risk Treatment
Wrap Up for Cybersecurity Risk Management
Cybersecurity Policy (Module 2.4)
Cybersecurity Policy
Enterprise Cybersecurity Policy
Issue Specific Cybersecurity Policies
System Specific Security Policies
Developing and Implementing Effective Cybersecurity Policy
Cybersecurity Policy
Policy, Standards, and Practices
Enterprise Cybersecurity Policy
Issue Specific Cybersecurity Policies
System Specific Security Policies
Developing and Implementing Effective Cybersecurity Policy
Cybersecurity Policy
Measuring Success in the Cybersecurity Program (Module 2.5)
Welcome to Performance Measures - Measuring Success in the Cybersecurity Program
What are Performance Measures?
Specifying Cybersecurity Measurements
Implementing the Cybersecurity Performance Measures Program
Wrap up for Performance Measures - Measuring Success in the Cybersecurity Program
Information Security Performance Measurement
What are Performance Measures?
Specifying Cybersecurity Measurements
Implementing the Cybersecurity Performance Measures Program
Wrap up for Performance Measures - Measuring Success in the Cybersecurity Program
Law and Regulation in Cybersecurity (Module 2.6)
Law and Regulation in Cybersecurity
Introduction to Key Security Laws
Privacy Laws
US and International Security Laws and Standards
Wrap up for Law and Regulation in Cybersecurity
Information Security and Law
Introduction to Key Security Laws
Privacy Laws
US and International Security Laws and Standards
Wrap up for Law and Regulation in Cybersecurity
Wrap-Up to the course 'The GRC Approach to Managing Cybersecurity'
Course Wrap-up on The GRC Approach to Managing Cybersecurity
Course Exam