Cybersecurity Management

The Cybersecurity Management skills path teaches you governance and risk management related to cybersecurity. You'll learn about developing and managing a security program, enterprise security operations, incident management, compliance and more.

Course

Security & Privacy Policies and Procedures

24 minutes

Course

IR, BC and DR Planning and Procedures

28 minutes

Course

Effective Incident Management

25 minutes

Course

Controls, Metrics, and Monitoring

17 minutes

Course

Security Program Activities

19 minutes

Course

Incident Response and Recovery Procedures

16 minutes

Course

Securing Communications and Collaboration Solutions

14 minutes

Course

Security Program Architecture

22 minutes

Course

Vulnerability Assessment Methods and Tools

21 minutes

Course

Monitoring and Communication

6 minutes

Course

Software Vulnerabilities and Security Controls

37 minutes

Course

Asset Classification and Operational Considerations

10 minutes

Course

Risk Assessment

17 minutes

Course

Risk Metric Scenarios

12 minutes

Course

Risk Mitigation Strategies and Controls

26 minutes

Course

Business Continuity Planning

40 minutes

Course

Business and Industry Influences and Risks

15 minutes

Course

Strategy and Implementation

17 minutes

Course

Implementation Action Plan

11 minutes

Course

IS Resources and Constraints

12 minutes

Course

Information Security Strategy

21 minutes

Course

IS Roles and Responsibilities

6 minutes

Course

Introduction to IS Governance

11 minutes

Course

Disaster Recovery

36 minutes

When trouble strikes, your preparations could mean the difference between disaster and a bump in the road. Review disaster recovery with six videos: Recovery Strategy, Recovery Process, Disaster Recovery Plan Testing, RAID (Redundant Array of Inexpensive Disks), Backups and Network Redundancy. Explore the development process for a disaster recovery strategy, look at the different models of disaster recovery plans and fallback sites, and compare Mean Time Between Failure (MTBF) and Mean Time to Repair (MTTR). Remember: “Nine-tenths of wisdom is being wise in time.”

Course

Preventative & Detective Measures

39 minutes

Seven videos reintroduce the student to the details of preventative and detective measures on a system. Beginning with log management, the course covers egress monitoring, configuration management, operations concepts, trusted recovery and patch management. Includes vocabulary and definitions, best practices and more.

Course

Computer Crime Investigations

32 minutes

“You’ve got no evidence!” criminals like to say. Actually, we do. This four-video course covers the fundamentals of computer crime investigations, from the types of crime to the investigation process, forensics and proper handling of evidence. Chain of custody, forensic timeline, computer crime categories and more will remind the student of the ins and outs of investigating crimes in the world of computers.

Course

Access Control Fundamentals

1 hour, 37 minutes

Twenty-two videos cover everything you want to know about access control fundamentals. Beginning with access control basics (definitions and subject-object relationships), we move on to access control categories, authentication, account management, Single Sign-On (SSO) and Kerberos, the three forms of user authentication and the arguable fourth form, remote authentication services and much more. This is a complex subject, but our Access Control Fundamentals course dives deep and dredges up the answers for you.

Course

Asset Security

39 minutes

Here are two questions everyone will eventually need to ask themselves: What do I have, and where is it? This seven-video course gives the student the tools to answer those questions by taking them through the minutiae of asset security. Beginning with managing sensitive data and basic principles such as need-to-know and definitions of important terms (quality control and assurance, data owner, data custodian and more), we conduct a deeper dive into six key topic areas: data remanence, data at rest, data in transit, data ownership, data security controls and classification.

Course

Security Policies

22 minutes

Organizations know the importance of planning ahead, and that’s what this course is about. A five-video series introduces you to security policies, procedures, standards, baselines and guidelines. Take an in-depth look at personnel security, the most common control frameworks, service-level agreements and the various types of security documents. What’s the difference between a policy and a procedure? Come find out!

Course

Risk Management

49 minutes

It’s nearly impossible to completely eliminate risk, but there are steps you can take to reduce it. This nine-video series on risk management takes a close look at risk management: definitions, tools, notable risk frameworks such as the NIST Risk Management Framework (RMF) and other Special Publications and the process of calculating risk. We also touch on threats and threat agents, the difference between due diligence and due care, and tips and best practices for ensuring that your employees are security-conscious and aware of risks. People are always the weakest link, so take an hour to learn how to strengthen them.