Introduction to Cybersecurity & Risk Management Specialization

Gain Skills in Cybersecurity and Risk Management. The three interconnected courses in this specialization cover security governance and compliance strategies, foundational risk management techniques, as well as personnel and third-party security measures.

Instructors: Qasim Ijaz +1 more

What you'll learn

  •   How to create security strategies that align with a company's goals and objectives
  •   How to apply risk assessment techniques to real-world situations
  •   How to implement effective security education, training, and awareness programs
  • Skills you'll gain

  •   Vendor Management
  •   Threat Modeling
  •   Compliance Management
  •   Asset Protection
  •   Vulnerability Assessments
  •   Risk Mitigation
  •   Cyber Security Policies
  •   Cyber Governance
  •   Risk Management Framework
  •   Risk Management
  •   Regulatory Compliance
  •   Cyber Security Strategy
  • Specialization - 3 course series

    The topics of these case studies cover a broad range of cybersecurity threats such as those posed by novel IoT technologies, ransomware attacks, and social engineering campaigns.

    Students are introduced to the field of cyber security with a focus on the domain of security & risk management. Topics include the fundamental concepts and goals of cybersecurity (the CIA triad), security governance design, the NIST cybersecurity framework, relevant laws and regulations, and the roles of policies, strategies, and procedures in cybersecurity governance.

    In this course, you will learn about risk assessment techniques and how to implement a number of strategies that will ensure the protection of assets. You will learn about the relationship between assets, vulnerabilities, threats, and risks. You will also engage with a number of current case studies in the industry that illustrate the material. You will leave the course with skills relating to threat modeling and business continuity planning that have direct applications at your current job or in your future career.

    In this course, you will learn all about the process of implementing effective education, training, and awareness programs. You will also study the role personnel security plays in protecting an organization’s assets, intellectual property, and physical assets. You will also be introduced to the steps required for effective Vendor Risk Management (VRM), including: due diligence, contracting, monitoring & accessing, and termination. Throughout the course, you will engage with current case studies that illustrate the key concepts in your lessons. You will also have the chance to submit assignments in which you will apply the material in a practical application.

    Introduction to Risk Management

    Personnel & Third-Party Security

    ©2025  ementorhub.com. All rights reserved