The ultimate destination for a security manager is the Chief Information Security Officer (or Chief Security Officer) a senior executive role responsible for all cybersecurity operations in the organization. But how do you get from entry-level IT or security employee to the CISO’s office and what do you need to know when you get there? This course examines the career path and requirements to be an effective CISO, as well as the roles and responsibilities of the position.
Implementing a Risk Management Framework
This course is part of Cybersecurity Risk Management Frameworks Specialization
Instructors: Michael Whitman, Ph.D., CISM, CISSP
Sponsored by Mojatu Foundation
1,848 already enrolled
What you'll learn
Identify the career development and path of a Cybersecurity professional from entry-level to CISO
Define and describe the role and function of a CISO in planning for cybersecurity
Identify the development of a cybersecurity governance program and the role the CISO would play in it
Discuss the strategic responsibilities of the CISO in overseeing an organization’s cybersecurity program
Details to know
Add to your LinkedIn profile
See how employees at top companies are mastering in-demand skills
Build your subject-matter expertise
- Learn new concepts from industry experts
- Gain a foundational understanding of a subject or tool
- Develop job-relevant skills with hands-on projects
- Earn a shareable career certificate
Earn a career certificate
Add this credential to your LinkedIn profile, resume, or CV
Share it on social media and in your performance review
There are 6 modules in this course
Learning objectives for the capstone project.
What's included
5 readings
Prepare and submit a case-based presentation to deliver the results of a proposal to implement a risk management framework suitable for the case organization.
What's included
1 reading1 peer review
Identify the information assets to be included in the risk management effort.
What's included
1 reading1 peer review
Identify threats to key information assets.
What's included
1 reading1 peer review
Perform risk analysis and prepare a report.
What's included
1 reading1 peer review
Justify a comprehensive risk management program for the case company.
What's included
1 reading1 peer review
Instructors
Offered by
Why people choose Coursera for their career
Recommended if you're interested in Information Technology
Universiteit Leiden
University of Maryland, College Park
University of Maryland, College Park
Infosec
Open new doors with Coursera Plus
Unlimited access to 10,000+ world-class courses, hands-on projects, and job-ready certificate programs - all included in your subscription
Advance your career with an online degree
Earn a degree from world-class universities - 100% online
Join over 3,400 global companies that choose Coursera for Business
Upskill your employees to excel in the digital economy