Moocable is learner-supported. When you buy through links on our site, we may earn an affiliate commission.

Cybersecurity Foundations for Risk Management

Description

In order to manage the cybersecurity function business, you must first understand its language and its environment. This course covers the foundations of cybersecurity, including threats and vulnerabilities as well as the tools, technologies, and strategies used to manage it.

After completing this course, a learner will be able to:
● Define key concepts and terminology in Cybersecurity
● Identify threats to cybersecurity
● Identify strategies to identify and remediate vulnerabilities in information assets
● Identify the systemic components (including personnel) necessary for an effective cybersecurity program

Tags

Syllabus

  • Welcome to Cybersecurity Foundations for Risk Management (Course 1)
    • This is an overview of the learning objectives for the course.
  • An Introduction to Cybersecurity (Module 1.1)
  • Threats to Cybersecurity (Module 1.2)
    • Learning objectives for Threats to Cybersecurity
  • Cybersecurity Management (Module 1.3)
  • Understanding Cybersecurity Risk and Risk Management (Module 1.4)
    • Learning objectives for Managing Vulnerabilities in Information Assets module
  • Wrap-up for Cybersecurity Foundations for Risk Management
    • This is the final module where you will take the Course Assessment.

Online Course


Cybersecurity Foundations for Risk Management

Affiliate notice

In order to manage the cybersecurity function business, you must first understand its language and its environment. This course covers the foundations of cybersecurity, including threats and vulnerabilities as well as the tools, technologies, and strategies used to manage it.

After completing this course, a learner will be able to:
● Define key concepts and terminology in Cybersecurity
● Identify threats to cybersecurity
● Identify strategies to identify and remediate vulnerabilities in information assets
● Identify the systemic components (including personnel) necessary for an effective cybersecurity program

  • Welcome to Cybersecurity Foundations for Risk Management (Course 1)
    • This is an overview of the learning objectives for the course.
  • An Introduction to Cybersecurity (Module 1.1)
  • Threats to Cybersecurity (Module 1.2)
    • Learning objectives for Threats to Cybersecurity
  • Cybersecurity Management (Module 1.3)
  • Understanding Cybersecurity Risk and Risk Management (Module 1.4)
    • Learning objectives for Managing Vulnerabilities in Information Assets module
  • Wrap-up for Cybersecurity Foundations for Risk Management
    • This is the final module where you will take the Course Assessment.