Kennesaw State University
Managing Cybersecurity Specialization
Kennesaw State University

Managing Cybersecurity Specialization

Managing Cybersecurity. Mastering the basics of managing cybersecurity in organizations

Herbert J. Mattord, Ph.D., CISM, CISSP, CDP
Michael Whitman, Ph.D., CISM, CISSP

Instructors: Herbert J. Mattord, Ph.D., CISM, CISSP, CDP

16,582 already enrolled

Included with Coursera Plus

Get in-depth knowledge of a subject
4.8

(617 reviews)

Beginner level

Recommended experience

2 months
at 10 hours a week
Flexible schedule
Learn at your own pace
Get in-depth knowledge of a subject
4.8

(617 reviews)

Beginner level

Recommended experience

2 months
at 10 hours a week
Flexible schedule
Learn at your own pace

What you'll learn

  • Understand that cybersecurity is a managerial problem.

  • Identify and manage risks to information assets within organizations.

  • Develop cybersecurity policies and plans for organizations.

  • Explain the integration of cybersecurity into all aspects of a business’s operations and use of information assets.

Details to know

Shareable certificate

Add to your LinkedIn profile

Taught in English

See how employees at top companies are mastering in-demand skills

Placeholder

Advance your subject-matter expertise

  • Learn in-demand skills from university and industry experts
  • Master a subject or tool with hands-on projects
  • Develop a deep understanding of key concepts
  • Earn a career certificate from Kennesaw State University
Placeholder
Placeholder

Earn a career certificate

Add this credential to your LinkedIn profile, resume, or CV

Share it on social media and in your performance review

Placeholder

Specialization - 5 course series

The Foundations of Cybersecurity

Course 18 hours4.8 (665 ratings)

What you'll learn

  • Define key concepts and terminology in Cybersecurity

  • Describe key threats to cybersecurity

  • Define strategies to identify and remediate vulnerabilities in information assets

  • Give examples of the systemic components (including personnel) necessary for an effective cybersecurity program

Skills you'll gain

Category: Cybersecurity planning
Category: Risk identification
Category: Risk treatment
Category: Cybersecurity performance measurement

The GRC Approach to Managing Cybersecurity

Course 210 hours4.7 (326 ratings)

What you'll learn

  • Identify the importance and functions of Governance, Risk Management, and Compliance in Cybersecurity program management.

  • Describe best practices in risk management including the domains of risk assessment and risk treatment.

  • Describe the structure and content of Cybersecurity-related strategy, plans, and planning

  • Identify the key components and methodologies of Cybersecurity policies and policy development

Skills you'll gain

Category: Wireless Security
Category: Intrusion Detection System
Category: Firewall (Computing)
Category: Computer Network

Managing Network Security

Course 315 hours4.8 (225 ratings)

What you'll learn

  • Describe the threats to data from information communication technology (ICT)

  • Identify the issues and practices associated with managing network security

  • Identify the practices, tools, and methodologies associated with assessing network security

  • Describe the components of an effective network security program

Skills you'll gain

Category: Business Continuity
Category: Disaster Recovery
Category: Incident response planning

Managing Cybersecurity Incidents and Disasters

Course 414 hours4.8 (234 ratings)

What you'll learn

  • Define and describe the components of a cybersecurity contingency planning program

  • Identify the components and structure of an effective cybersecurity incident response program

  • Identify the components and structure of an effective cybersecurity disaster recovery program

  • Define and describe recommended contingency strategies including data backup and recovery and continuity of cybersecurity operations

Skills you'll gain

Category: Risk Management
Category: Contingency Plan
Category: Cybersecurity Staffing
Category: Cybersecurity Governance
Category: Cyber-Security Regulation

Road to the CISO – Culminating Project Course

Course 518 hours4.8 (25 ratings)

What you'll learn

  • Identify the career development and path of a Cybersecurity professional from entry-level to CISO

  • Define and describe the role and function of a CISO in planning for cybersecurity

  • Identify the development of a cybersecurity governance program and the role the CISO would play in it

  • Discuss the strategic responsibilities of the CISO in overseeing an organization’s cybersecurity program

Skills you'll gain

Category: Cybersecurity terminology
Category: cybersecurity program elements
Category: Security vulnerabilities and treatments
Category: Threats to cybersecurity

Instructors

Herbert J. Mattord, Ph.D., CISM, CISSP, CDP
Kennesaw State University
19 Courses131,817 learners
Michael Whitman, Ph.D., CISM, CISSP
Kennesaw State University
19 Courses131,817 learners

Offered by

Why people choose Coursera for their career

Felipe M.
Learner since 2018
"To be able to take courses at my own pace and rhythm has been an amazing experience. I can learn whenever it fits my schedule and mood."
Jennifer J.
Learner since 2020
"I directly applied the concepts and skills I learned from my courses to an exciting new project at work."
Larry W.
Learner since 2021
"When I need courses on topics that my university doesn't offer, Coursera is one of the best places to go."
Chaitanya A.
"Learning isn't just about being better at your job: it's so much more than that. Coursera allows me to learn without limits."

New to Security? Start here.

Placeholder

Open new doors with Coursera Plus

Unlimited access to 10,000+ world-class courses, hands-on projects, and job-ready certificate programs - all included in your subscription

Advance your career with an online degree

Earn a degree from world-class universities - 100% online

Join over 3,400 global companies that choose Coursera for Business

Upskill your employees to excel in the digital economy

Frequently asked questions