What Is Team Management: Strategies, Duties, Job, Career Outlook
January 21, 2025
Article
Managing Cybersecurity. Mastering the basics of managing cybersecurity in organizations
Instructors: Herbert J. Mattord, Ph.D., CISM, CISSP, CDP
16,977 already enrolled
Included with
(628 reviews)
Recommended experience
Beginner level
A well-qualified student would have:
General understanding of computing and the operations of Information Technology in the organization.
Prior work experience would help to thoroughly understand how cybersecurity can impact organizational performance but it is not necessary to do well in the course.
Preferably have completed the Cybersecurity and Its Ten Domains MOOC on Coursera.
(628 reviews)
Recommended experience
Beginner level
A well-qualified student would have:
General understanding of computing and the operations of Information Technology in the organization.
Prior work experience would help to thoroughly understand how cybersecurity can impact organizational performance but it is not necessary to do well in the course.
Preferably have completed the Cybersecurity and Its Ten Domains MOOC on Coursera.
Understand that cybersecurity is a managerial problem.
Identify and manage risks to information assets within organizations.
Develop cybersecurity policies and plans for organizations.
Explain the integration of cybersecurity into all aspects of a business’s operations and use of information assets.
Add to your LinkedIn profile
Add this credential to your LinkedIn profile, resume, or CV
Share it on social media and in your performance review
This specialization is intended for those learners that:
- would preferably have an undergraduate (bachelors) degree, or is a currently enrolled student
- are interested in the area of IT and cybersecurity and how it relates to business decisions
- is currently employed or seeking employment and needs to understand issues and best practices around Cybersecurity
- may be a IT or Cybersecurity professional or technician
- may be interested in Cybersecurity and unsure of how to approach a career in it
Applied Learning Project
Given a case study of a sample organization, the student will specify the number, role, and qualifications of cybersecurity staff, identify the number and types of policy needed, outline a risk management program, specify the committees, roles, and plans needed to perform contingency planning and outline a cybersecurity governance program.
Define key concepts and terminology in Cybersecurity
Describe key threats to cybersecurity
Define strategies to identify and remediate vulnerabilities in information assets
Give examples of the systemic components (including personnel) necessary for an effective cybersecurity program
Identify the importance and functions of Governance, Risk Management, and Compliance in Cybersecurity program management.
Describe best practices in risk management including the domains of risk assessment and risk treatment.
Describe the structure and content of Cybersecurity-related strategy, plans, and planning
Identify the key components and methodologies of Cybersecurity policies and policy development
Describe the threats to data from information communication technology (ICT)
Identify the issues and practices associated with managing network security
Identify the practices, tools, and methodologies associated with assessing network security
Describe the components of an effective network security program
Define and describe the components of a cybersecurity contingency planning program
Identify the components and structure of an effective cybersecurity incident response program
Identify the components and structure of an effective cybersecurity disaster recovery program
Define and describe recommended contingency strategies including data backup and recovery and continuity of cybersecurity operations
Identify the career development and path of a Cybersecurity professional from entry-level to CISO
Define and describe the role and function of a CISO in planning for cybersecurity
Identify the development of a cybersecurity governance program and the role the CISO would play in it
Discuss the strategic responsibilities of the CISO in overseeing an organization’s cybersecurity program
Kennesaw State is a Carnegie-designated doctoral research institution (R2), placing it among an elite group of only 6 percent of U.S. colleges. A leader in innovative teaching and learning, KSU is making an impact across the region, the nation and around the world. As the third largest university in the state of Georgia, Kennesaw State has nearly 45,000 students enrolled in over 180 undergraduate, master’s, doctoral degree and certificate programs.
Unlimited access to 10,000+ world-class courses, hands-on projects, and job-ready certificate programs - all included in your subscription
Earn a degree from world-class universities - 100% online
Upskill your employees to excel in the digital economy
Each of the four content courses is designed to be completed in 10 to 12 hours. The final project may take from 10 to 20 hours depending on the level or prior knowledg for the student.
A general understanding of business information technology is assumed. prior work experience may aid in understanding the impact of cybersecurity in the business setting.
That is recommended as some of the materials are built on the content of earlier sections.
No. Although, some of the content may prepare a student for parts of credit-by-examination opportunities.
Have a broad understanding of how cybersecurity processes are managed in organizations.
This course is completely online, so there’s no need to show up to a classroom in person. You can access your lectures, readings and assignments anytime and anywhere via the web or your mobile device.
If you subscribed, you get a 7-day free trial during which you can cancel at no penalty. After that, we don’t give refunds, but you can cancel your subscription at any time. See our full refund policy.
Yes! To get started, click the course card that interests you and enroll. You can enroll and complete the course to earn a shareable certificate, or you can audit it to view the course materials for free. When you subscribe to a course that is part of a Specialization, you’re automatically subscribed to the full Specialization. Visit your learner dashboard to track your progress.
Yes. In select learning programs, you can apply for financial aid or a scholarship if you can’t afford the enrollment fee. If fin aid or scholarship is available for your learning program selection, you’ll find a link to apply on the description page.
When you enroll in the course, you get access to all of the courses in the Specialization, and you earn a certificate when you complete the work. If you only want to read and view the course content, you can audit the course for free. If you cannot afford the fee, you can apply for financial aid.
These cookies are necessary for the website to function and cannot be switched off in our systems. They are usually only set in response to actions made by you which amount to a request for services, such as setting your privacy preferences, logging in or filling in forms. You can set your browser to block or alert you about these cookies, but some parts of the site will not then work.
These cookies may be set through our site by our advertising partners. They may be used by those companies to build a profile of your interests and show you relevant adverts on other sites. They are based on uniquely identifying your browser and internet device. If you do not allow these cookies, you will experience less targeted advertising.
These cookies allow us to count visits and traffic sources so we can measure and improve the performance of our site. They help us to know which pages are the most and least popular and see how visitors move around the site. If you do not allow these cookies we will not know when you have visited our site, and will not be able to monitor its performance.
These cookies enable the website to provide enhanced functionality and personalization. They may be set by us or by third party providers whose services we have added to our pages. If you do not allow these cookies then some or all of these services may not function properly.