Master the principles of Governance, Risk Management, and Compliance (GRC) in cybersecurity, from strategic planning to policy implementation.
Master the principles of Governance, Risk Management, and Compliance (GRC) in cybersecurity, from strategic planning to policy implementation.
This course cannot be purchased separately - to access the complete learning experience, graded assignments, and earn certificates, you'll need to enroll in the full Managing Cybersecurity Specialization program. You can audit this specific course for free to explore the content, which includes access to course materials and lectures. This allows you to learn at your own pace without any financial commitment.
4.7
(319 ratings)
13,973 already enrolled
Instructors:
English
پښتو, বাংলা, اردو, 3 more
What you'll learn
Understand GRC functions in cybersecurity management
Implement effective risk assessment and treatment strategies
Develop comprehensive cybersecurity policies
Create strategic plans for cybersecurity programs
Measure and improve cybersecurity performance
Skills you'll gain
This course includes:
4.5 Hours PreRecorded video
31 assignments
Access on Mobile, Tablet, Desktop
FullTime access
Shareable certificate
Closed caption
Get a Completion Certificate
Share your certificate with prospective employers and your professional network on LinkedIn.
Created by
Provided by

Top companies offer this course to their employees
Top companies provide this course to enhance their employees' skills, ensuring they excel in handling complex projects and drive organizational success.





There are 8 modules in this course
This comprehensive course explores the GRC (Governance, Risk Management, and Compliance) approach to managing cybersecurity programs. The curriculum covers essential topics including risk assessment and treatment, strategic planning, policy development, and performance measurement. Students learn to develop and implement effective cybersecurity policies, manage risks, and ensure compliance with relevant laws and regulations.
Welcome to The GRC Approach to Managing Cybersecurity (Course 2)
Module 1 · 16 Minutes to complete
Introduction to the Management of Cybersecurity
Module 2 · 2 Hours to complete
Cybersecurity Governance and Planning
Module 3 · 1 Hours to complete
Cybersecurity Risk Management
Module 4 · 1 Hours to complete
Measuring Success in the Cybersecurity Program
Module 6 · 1 Hours to complete
Law and Regulation in Cybersecurity
Module 7 · 1 Hours to complete
Wrap-Up to the course 'The GRC Approach to Managing Cybersecurity'
Module 8 · 1 Hours to complete
Fee Structure
Instructors
Expert in Information Security at Kennesaw State University
Dr. Herbert J. Mattord is a Professor of Information Security and Assurance at Kennesaw State University, where he teaches courses in cybersecurity and serves as the Director of Education and Outreach at the KSU Institute for Cybersecurity Workforce Development. With 26 years of experience in the IT industry prior to his academic career, which began in 2002, Dr. Mattord has held various roles including application developer, database administrator, project manager, and information security practitioner. His practical expertise was further enhanced during his tenure as the Manager of Corporate Information Technology Security at Georgia-Pacific Corporation. Additionally, he has taught as an adjunct professor at several institutions and is a co-author of key textbooks in the field, including Principles of Information Security and Management of Information Security. Dr. Mattord earned his Ph.D. in Information Systems with a focus on Information Security from Nova Southeastern University.
Leading Authority in Information Security at Kennesaw State University
Dr. Michael Whitman is a Professor of Information Security in the Information Systems and Security Department at Kennesaw State University, where he also serves as the Executive Director of the KSU Institute for Cybersecurity Workforce Development. With a Ph.D. in Management Information Systems, Dr. Whitman teaches both graduate and undergraduate courses in cybersecurity and has made significant contributions to the field through numerous publications in top academic journals. He is a co-author of several widely used textbooks in information security and has played a crucial role in establishing Kennesaw State as a National Center of Academic Excellence in Information Assurance and Cyber Defense Education, recognized by the National Security Agency and the Department of Homeland Security. Under his leadership, the university's cybersecurity programs have flourished, reflecting his commitment to advancing education and workforce development in this critical area.
Testimonials
Testimonials and success stories are a testament to the quality of this program and its impact on your career and learning journey. Be the first to help others make an informed decision by sharing your review of the course.
Frequently asked questions
Below are some of the most commonly asked questions about this course. We aim to provide clear and concise answers to help you better understand the course content, structure, and any other relevant information. If you have any additional questions or if your question is not listed here, please don't hesitate to reach out to our support team for further assistance.