In this course, you will learn all about the process of implementing effective education, training, and awareness programs. You will also study the role personnel security plays in protecting an organization’s assets, intellectual property, and physical assets. You will also be introduced to the steps required for effective Vendor Risk Management (VRM), including: due diligence, contracting, monitoring & accessing, and termination. Throughout the course, you will engage with current case studies that illustrate the key concepts in your lessons. You will also have the chance to submit assignments in which you will apply the material in a practical application.
Personnel & Third-Party Security
This course is part of Introduction to Cybersecurity & Risk Management Specialization
Instructor: Qasim Ijaz
Sponsored by ITC-Infotech
2,503 already enrolled
(37 reviews)
Details to know
Add to your LinkedIn profile
4 assignments
See how employees at top companies are mastering in-demand skills
Build your subject-matter expertise
- Learn new concepts from industry experts
- Gain a foundational understanding of a subject or tool
- Develop job-relevant skills with hands-on projects
- Earn a shareable career certificate
Earn a career certificate
Add this credential to your LinkedIn profile, resume, or CV
Share it on social media and in your performance review
There are 4 modules in this course
Welcome to the first module of Personnel & Third Party Security! Education, training, and awareness of security threats are important for many actors within an organization. It’s not only your users who make bad decisions, it’s also administrators, IT staff, security staff, and risk assessors. In this module we will dive into the process of implementing effective education, training, and awareness programs.
What's included
3 videos1 reading1 assignment1 peer review
Welcome to Module 2! Personnel security plays a critical role in protecting an organization’s assets, for example intellectual property, such as customer data or physical assets. Organizations define their security requirements around personnel’s use of organizational assets and then use technical and physical controls to implement them. Through personnel security controls, we work towards a reduction in the misuse, theft, or fraud related to our assets.
What's included
3 videos1 reading1 assignment1 peer review
Welcome to Module 3! In this module we will introduce the steps required for effective Vendor Risk Management (VRM), including: due diligence, contracting, monitoring and accessing, as well as termination. When it comes to VRM, we cannot completely eliminate all risk, however, we may be able to reduce risk. The key is to ensure there is no "unacceptable" risk.
What's included
2 videos1 reading1 assignment1 peer review
Welcome to the fourth and final module of Personnel & Third-Party Security! Imagine you just bought new hardware, software, or merged with another company. How do you ensure that these actions do not reduce your cyber security posture and increase your risk to external and internal threats? Introducing cyber security risk considerations into acquisition strategy can help deal with these concerns.
What's included
2 videos1 reading1 assignment1 peer review
Instructor
Offered by
Why people choose Coursera for their career
Learner reviews
37 reviews
- 5 stars
72.97%
- 4 stars
27.02%
- 3 stars
0%
- 2 stars
0%
- 1 star
0%
Showing 3 of 37
Reviewed on Jan 3, 2022
This course was easy and I had a hard time understanding the cyber talk, but it was very fun and I enjoyed the course work. Just hoping that my peers take the time to review my assignments.
Recommended if you're interested in Information Technology
Open new doors with Coursera Plus
Unlimited access to 10,000+ world-class courses, hands-on projects, and job-ready certificate programs - all included in your subscription
Advance your career with an online degree
Earn a degree from world-class universities - 100% online
Join over 3,400 global companies that choose Coursera for Business
Upskill your employees to excel in the digital economy