Cybersecurity Management
Rated 3.5/5 based on 11 customer reviews

Cybersecurity Management

Available: Out of Stock
$0.00

Request Info
The Cybersecurity Management skill path teaches you governance and risk management related to cybersecurity. You’ll learn about developing and managing a security program, enterprise security operations, incident management, compliance and more.

Security & Privacy Policies and Procedures

Course | 24 minutes

This course helps you refresh your knowledge of security and privacy policies and procedures..

IR, BC and DR Planning and Procedures

Course | 28 minutes

The fundamentals of incident response, business continuity and disaster recovery are explored in six videos.

Effective Incident Management

Course | 25 minutes

Review effective incident management with eight videos on metrics, response procedures and more.

Controls, Metrics and Monitoring

Course | 17 minutes

ITake a closer look at what tools you have with this course on controls, metrics and monitoring for security managers

Security Program Activities

Course | 19 minutes

Explore security program activities with two videos on business case development, program development, documentation and more.

Incident Response and Recovery Procedures

Course | 16 minutes

Prepare for possible trouble with this course on incident response and recovery procedures, including designing systems to facilitate incident response

Securing Communications and Collaboration Solutions

Course | 14 minutes

Secure your communications and collaboration solutions with this course covering BYOD, mobile device management and more.

Security Program Architecture

Course | 22 minutes

nformation security program architecture is reviewed and dissected in ten videos. Controls, objectives, program elements and more provide a strong foundation for an aspiring security manager.

Vulnerability Assessment Methods and Tools

Course | 21 minutes

This course helps you broaden your understanding of vulnerability assessment and tools, including tool lists and test types.

Monitoring and Communication

Course | 6 minutes

Enhance your risk management skills with three videos on risk monitoring and communication.

Software Vulnerabilities and Security Controls

Course | 37 minutes

In this course, we take you through the fundamentals of software vulnerabilities and security controls.

Asset Classification and Operational Considerations

Course | 10 minutes

Review asset classification and operational considerations in five videos, covering vocabulary, diagrams, key terms and important takeaways.

Risk Assessment

Course | 17 minutes

Refresh your knowledge of how bad things can get with this course on the four steps of risk assessment: Prepare, Conduct the Assessment, Report and Communicate and Maintain.

Risk Metric Scenarios

Course | 12 minutes

This course on risk metric scenarios covers analyzing scenarios to secure enterprises and reviewing existing security..

Risk Mitigation Strategies and Controls

Course | 26 minutes

Dive into risk mitigation strategies and controls with this course on risk scenarios, responses and more

Business Continuity Planning

Course | 40 minutes

Review business continuity planning and the challenges of disaster recovery with two videos on business impact analysis, auditing business continuity and more.

Business and Industry Influences and Risks

Course | 15 minutes

Brush up on your knowledge of business and industry influences and risks with this course on enterprise risk management (ERM) and business models.

Strategy and Implementation

Course | 17 minutes

Take a fresh look at risk management strategy and implementation. Includes vocabulary, phases and tips for effective information risk management

Implementation Action Plan

Course | 11 minutes

Two videos help you review action plan types, action plan implementation strategies and information security program objectives.

IS Resources and Constraints

Course | 12 minutes

Information security resources and constraints are examined in this two-video course covering personnel, organizational structure and more.

Information Security Strategy

Course | 21 minutes

Five videos take you through the core tenets of information security strategy, including strategy elements and metrics.

IS Roles and Responsibilities

Course | 6 minutes

Refresh your knowledge of information security roles and responsibilities with three videos on key roles and responsibilities, risk management and associated topics.

Introduction to IS Governance

Course | 11 minutes

Three videos provide an introduction to information security governance, including the use of governance and why it is important for an organization.

Disaster Recovery

Course | 36 minutes

Don’t let a lack of preparedness compound the effects of a disaster. Learn how to create and test a disaster recovery plan in this six-video course.

Preventative & Detective Measures

Course | 39 minutes

Explore ways to prevent cyber threats from impacting your organization, and learn how to quickly detect the threats that do slip through your defenses.

Computer Crime Investigations

Course | 32 minutes

Refresh your knowledge of cybercrime investigations with this overview course covering the investigation process and the discovery of digital evidence.

Access Control Fundamentals

Course | 1 hour 37 minutes

Take a deep dive into one of the fundamental concepts of security: access control. Learn how to give the right people access to the right information in a secure way.

Asset Security

Course | 39 minutes

Learn how to secure sensitive data, including managing and classifying data, working with data at rest and in transit, and implementing data security controls.

Security Policies

Course | 22 minutes

Explore security policies and control frameworks and how they help drive the overall security of an organization.

Risk Management

Course | 49 minutes

Dive deep into risk management, including risk frameworks, assessments and modeling, as well as employee security awareness, vendor security and other issues.

The Cybersecurity Management skill path teaches you governance and risk management related to cybersecurity. You’ll learn about developing and managing a security program, enterprise security operations, incident management, compliance and more.

Security & Privacy Policies and Procedures

Course | 24 minutes

This course helps you refresh your knowledge of security and privacy policies and procedures..

IR, BC and DR Planning and Procedures

Course | 28 minutes

The fundamentals of incident response, business continuity and disaster recovery are explored in six videos.

Effective Incident Management

Course | 25 minutes

Review effective incident management with eight videos on metrics, response procedures and more.

Controls, Metrics and Monitoring

Course | 17 minutes

ITake a closer look at what tools you have with this course on controls, metrics and monitoring for security managers

Security Program Activities

Course | 19 minutes

Explore security program activities with two videos on business case development, program development, documentation and more.

Incident Response and Recovery Procedures

Course | 16 minutes

Prepare for possible trouble with this course on incident response and recovery procedures, including designing systems to facilitate incident response

Securing Communications and Collaboration Solutions

Course | 14 minutes

Secure your communications and collaboration solutions with this course covering BYOD, mobile device management and more.

Security Program Architecture

Course | 22 minutes

nformation security program architecture is reviewed and dissected in ten videos. Controls, objectives, program elements and more provide a strong foundation for an aspiring security manager.

Vulnerability Assessment Methods and Tools

Course | 21 minutes

This course helps you broaden your understanding of vulnerability assessment and tools, including tool lists and test types.

Monitoring and Communication

Course | 6 minutes

Enhance your risk management skills with three videos on risk monitoring and communication.

Software Vulnerabilities and Security Controls

Course | 37 minutes

In this course, we take you through the fundamentals of software vulnerabilities and security controls.

Asset Classification and Operational Considerations

Course | 10 minutes

Review asset classification and operational considerations in five videos, covering vocabulary, diagrams, key terms and important takeaways.

Risk Assessment

Course | 17 minutes

Refresh your knowledge of how bad things can get with this course on the four steps of risk assessment: Prepare, Conduct the Assessment, Report and Communicate and Maintain.

Risk Metric Scenarios

Course | 12 minutes

This course on risk metric scenarios covers analyzing scenarios to secure enterprises and reviewing existing security..

Risk Mitigation Strategies and Controls

Course | 26 minutes

Dive into risk mitigation strategies and controls with this course on risk scenarios, responses and more

Business Continuity Planning

Course | 40 minutes

Review business continuity planning and the challenges of disaster recovery with two videos on business impact analysis, auditing business continuity and more.

Business and Industry Influences and Risks

Course | 15 minutes

Brush up on your knowledge of business and industry influences and risks with this course on enterprise risk management (ERM) and business models.

Strategy and Implementation

Course | 17 minutes

Take a fresh look at risk management strategy and implementation. Includes vocabulary, phases and tips for effective information risk management

Implementation Action Plan

Course | 11 minutes

Two videos help you review action plan types, action plan implementation strategies and information security program objectives.

IS Resources and Constraints

Course | 12 minutes

Information security resources and constraints are examined in this two-video course covering personnel, organizational structure and more.

Information Security Strategy

Course | 21 minutes

Five videos take you through the core tenets of information security strategy, including strategy elements and metrics.

IS Roles and Responsibilities

Course | 6 minutes

Refresh your knowledge of information security roles and responsibilities with three videos on key roles and responsibilities, risk management and associated topics.

Introduction to IS Governance

Course | 11 minutes

Three videos provide an introduction to information security governance, including the use of governance and why it is important for an organization.

Disaster Recovery

Course | 36 minutes

Don’t let a lack of preparedness compound the effects of a disaster. Learn how to create and test a disaster recovery plan in this six-video course.

Preventative & Detective Measures

Course | 39 minutes

Explore ways to prevent cyber threats from impacting your organization, and learn how to quickly detect the threats that do slip through your defenses.

Computer Crime Investigations

Course | 32 minutes

Refresh your knowledge of cybercrime investigations with this overview course covering the investigation process and the discovery of digital evidence.

Access Control Fundamentals

Course | 1 hour 37 minutes

Take a deep dive into one of the fundamental concepts of security: access control. Learn how to give the right people access to the right information in a secure way.

Asset Security

Course | 39 minutes

Learn how to secure sensitive data, including managing and classifying data, working with data at rest and in transit, and implementing data security controls.

Security Policies

Course | 22 minutes

Explore security policies and control frameworks and how they help drive the overall security of an organization.

Risk Management

Course | 49 minutes

Dive deep into risk management, including risk frameworks, assessments and modeling, as well as employee security awareness, vendor security and other issues.