RiseUpp Logo
Educator Logo

The GRC Approach to Managing Cybersecurity

Master the principles of Governance, Risk Management, and Compliance (GRC) in cybersecurity, from strategic planning to policy implementation.

Master the principles of Governance, Risk Management, and Compliance (GRC) in cybersecurity, from strategic planning to policy implementation.

This course cannot be purchased separately - to access the complete learning experience, graded assignments, and earn certificates, you'll need to enroll in the full Managing Cybersecurity Specialization program. You can audit this specific course for free to explore the content, which includes access to course materials and lectures. This allows you to learn at your own pace without any financial commitment.

4.7

(319 ratings)

13,973 already enrolled

English

پښتو, বাংলা, اردو, 3 more

Powered by

Provider Logo
The GRC Approach to Managing Cybersecurity

This course includes

10 Hours

Of Self-paced video lessons

Beginner Level

Completion Certificate

awarded on course completion

Free course

What you'll learn

  • Understand GRC functions in cybersecurity management

  • Implement effective risk assessment and treatment strategies

  • Develop comprehensive cybersecurity policies

  • Create strategic plans for cybersecurity programs

  • Measure and improve cybersecurity performance

Skills you'll gain

Cybersecurity Management
Risk Assessment
Policy Development
Governance
Compliance
Strategic Planning
Performance Measurement
Security Laws

This course includes:

4.5 Hours PreRecorded video

31 assignments

Access on Mobile, Tablet, Desktop

FullTime access

Shareable certificate

Closed caption

Get a Completion Certificate

Share your certificate with prospective employers and your professional network on LinkedIn.

Certificate

Top companies offer this course to their employees

Top companies provide this course to enhance their employees' skills, ensuring they excel in handling complex projects and drive organizational success.

icon-0icon-1icon-2icon-3icon-4

There are 8 modules in this course

This comprehensive course explores the GRC (Governance, Risk Management, and Compliance) approach to managing cybersecurity programs. The curriculum covers essential topics including risk assessment and treatment, strategic planning, policy development, and performance measurement. Students learn to develop and implement effective cybersecurity policies, manage risks, and ensure compliance with relevant laws and regulations.

Welcome to The GRC Approach to Managing Cybersecurity (Course 2)

Module 1 · 16 Minutes to complete

Introduction to the Management of Cybersecurity

Module 2 · 2 Hours to complete

Cybersecurity Governance and Planning

Module 3 · 1 Hours to complete

Cybersecurity Risk Management

Module 4 · 1 Hours to complete

Cybersecurity Policy

Module 5 · 1 Hours to complete

Measuring Success in the Cybersecurity Program

Module 6 · 1 Hours to complete

Law and Regulation in Cybersecurity

Module 7 · 1 Hours to complete

Wrap-Up to the course 'The GRC Approach to Managing Cybersecurity'

Module 8 · 1 Hours to complete

Fee Structure

Instructors

Herbert J. Mattord
Herbert J. Mattord

5 rating

5 Reviews

1,30,156 Students

113 Courses

Expert in Information Security at Kennesaw State University

Dr. Herbert J. Mattord is a Professor of Information Security and Assurance at Kennesaw State University, where he teaches courses in cybersecurity and serves as the Director of Education and Outreach at the KSU Institute for Cybersecurity Workforce Development. With 26 years of experience in the IT industry prior to his academic career, which began in 2002, Dr. Mattord has held various roles including application developer, database administrator, project manager, and information security practitioner. His practical expertise was further enhanced during his tenure as the Manager of Corporate Information Technology Security at Georgia-Pacific Corporation. Additionally, he has taught as an adjunct professor at several institutions and is a co-author of key textbooks in the field, including Principles of Information Security and Management of Information Security. Dr. Mattord earned his Ph.D. in Information Systems with a focus on Information Security from Nova Southeastern University.

Michael Whitman
Michael Whitman

5 rating

8 Reviews

1,30,156 Students

19 Courses

Leading Authority in Information Security at Kennesaw State University

Dr. Michael Whitman is a Professor of Information Security in the Information Systems and Security Department at Kennesaw State University, where he also serves as the Executive Director of the KSU Institute for Cybersecurity Workforce Development. With a Ph.D. in Management Information Systems, Dr. Whitman teaches both graduate and undergraduate courses in cybersecurity and has made significant contributions to the field through numerous publications in top academic journals. He is a co-author of several widely used textbooks in information security and has played a crucial role in establishing Kennesaw State as a National Center of Academic Excellence in Information Assurance and Cyber Defense Education, recognized by the National Security Agency and the Department of Homeland Security. Under his leadership, the university's cybersecurity programs have flourished, reflecting his commitment to advancing education and workforce development in this critical area.

The GRC Approach to Managing Cybersecurity

This course includes

10 Hours

Of Self-paced video lessons

Beginner Level

Completion Certificate

awarded on course completion

Free course

Testimonials

Testimonials and success stories are a testament to the quality of this program and its impact on your career and learning journey. Be the first to help others make an informed decision by sharing your review of the course.

Frequently asked questions

Below are some of the most commonly asked questions about this course. We aim to provide clear and concise answers to help you better understand the course content, structure, and any other relevant information. If you have any additional questions or if your question is not listed here, please don't hesitate to reach out to our support team for further assistance.