Master essential cybersecurity concepts and risk management principles. Learn about threats, vulnerabilities, and effective security strategies.
Master essential cybersecurity concepts and risk management principles. Learn about threats, vulnerabilities, and effective security strategies.
This course cannot be purchased separately - to access the complete learning experience, graded assignments, and earn certificates, you'll need to enroll in the full Cybersecurity Risk Management Frameworks Specialization program. You can audit this specific course for free to explore the content, which includes access to course materials and lectures. This allows you to learn at your own pace without any financial commitment.
4.7
(105 ratings)
4,930 already enrolled
Instructors:
English
21 languages available
What you'll learn
Define key cybersecurity concepts and terminology
Identify and analyze cybersecurity threats
Understand security management roles and responsibilities
Implement effective risk management strategies
Develop security governance frameworks
Master contingency planning principles
Skills you'll gain
This course includes:
2.93 Hours PreRecorded video
20 assignments
Access on Mobile, Tablet, Desktop
FullTime access
Shareable certificate
Get a Completion Certificate
Share your certificate with prospective employers and your professional network on LinkedIn.
Created by
Provided by

Top companies offer this course to their employees
Top companies provide this course to enhance their employees' skills, ensuring they excel in handling complex projects and drive organizational success.





There are 6 modules in this course
This comprehensive course provides a foundational understanding of cybersecurity concepts and their application in risk management. Students learn essential terminology, threat identification, and security management principles. The curriculum covers key areas including cybersecurity governance, roles and responsibilities, risk assessment, and contingency planning. Through structured modules, learners develop practical knowledge of security program components and risk management strategies.
Welcome to Cybersecurity Foundations for Risk Management
Module 1 · 6 Minutes to complete
An Introduction to Cybersecurity
Module 2 · 1 Hours to complete
Threats to Cybersecurity
Module 3 · 1 Hours to complete
Cybersecurity Management
Module 4 · 2 Hours to complete
Understanding Cybersecurity Risk and Risk Management
Module 5 · 1 Hours to complete
Wrap-up for Cybersecurity Foundations for Risk Management
Module 6 · 1 Hours to complete
Fee Structure
Instructors
Expert in Information Security at Kennesaw State University
Dr. Herbert J. Mattord is a Professor of Information Security and Assurance at Kennesaw State University, where he teaches courses in cybersecurity and serves as the Director of Education and Outreach at the KSU Institute for Cybersecurity Workforce Development. With 26 years of experience in the IT industry prior to his academic career, which began in 2002, Dr. Mattord has held various roles including application developer, database administrator, project manager, and information security practitioner. His practical expertise was further enhanced during his tenure as the Manager of Corporate Information Technology Security at Georgia-Pacific Corporation. Additionally, he has taught as an adjunct professor at several institutions and is a co-author of key textbooks in the field, including Principles of Information Security and Management of Information Security. Dr. Mattord earned his Ph.D. in Information Systems with a focus on Information Security from Nova Southeastern University.
Leading Authority in Information Security at Kennesaw State University
Dr. Michael Whitman is a Professor of Information Security in the Information Systems and Security Department at Kennesaw State University, where he also serves as the Executive Director of the KSU Institute for Cybersecurity Workforce Development. With a Ph.D. in Management Information Systems, Dr. Whitman teaches both graduate and undergraduate courses in cybersecurity and has made significant contributions to the field through numerous publications in top academic journals. He is a co-author of several widely used textbooks in information security and has played a crucial role in establishing Kennesaw State as a National Center of Academic Excellence in Information Assurance and Cyber Defense Education, recognized by the National Security Agency and the Department of Homeland Security. Under his leadership, the university's cybersecurity programs have flourished, reflecting his commitment to advancing education and workforce development in this critical area.
Testimonials
Testimonials and success stories are a testament to the quality of this program and its impact on your career and learning journey. Be the first to help others make an informed decision by sharing your review of the course.
4.7 course rating
105 ratings
Frequently asked questions
Below are some of the most commonly asked questions about this course. We aim to provide clear and concise answers to help you better understand the course content, structure, and any other relevant information. If you have any additional questions or if your question is not listed here, please don't hesitate to reach out to our support team for further assistance.