Master cybersecurity risk management and CISO responsibilities. Learn to develop governance programs and strategic planning for organizational security.
Master cybersecurity risk management and CISO responsibilities. Learn to develop governance programs and strategic planning for organizational security.
This course cannot be purchased separately - to access the complete learning experience, graded assignments, and earn certificates, you'll need to enroll in the full Cybersecurity Risk Management Frameworks Specialization program. You can audit this specific course for free to explore the content, which includes access to course materials and lectures. This allows you to learn at your own pace without any financial commitment.
Instructors:
English
What you'll learn
Identify the career path from entry-level to CISO
Define the role and function of a CISO in cybersecurity planning
Develop comprehensive cybersecurity governance programs
Implement effective risk management frameworks
Oversee organizational cybersecurity strategy
Skills you'll gain
This course includes:
17.5 Hours PreRecorded video
5 peer reviews
Access on Mobile, Tablet, Desktop
FullTime access
Shareable certificate
Get a Completion Certificate
Share your certificate with prospective employers and your professional network on LinkedIn.
Created by
Provided by

Top companies offer this course to their employees
Top companies provide this course to enhance their employees' skills, ensuring they excel in handling complex projects and drive organizational success.





There are 6 modules in this course
This comprehensive course examines the career path and requirements to become an effective Chief Information Security Officer (CISO), as well as the roles and responsibilities of the position. Students learn about cybersecurity governance, strategic planning, and risk management framework implementation. The course covers career development from entry-level to CISO, including the development of cybersecurity governance programs and strategic responsibilities in overseeing organizational security.
Introduction to The Culminating Project
Module 1 · 2 Hours to complete
Case Project Assignment 1 of 5
Module 2 · 3 Hours to complete
Case Project Assignment 2 of 5
Module 3 · 3 Hours to complete
Case Project Assignment 3 of 5
Module 4 · 3 Hours to complete
Case Project Assignment 4 of 5
Module 5 · 3 Hours to complete
Case Project Assignment 5 of 5
Module 6 · 3 Hours to complete
Fee Structure
Instructors
Expert in Information Security at Kennesaw State University
Dr. Herbert J. Mattord is a Professor of Information Security and Assurance at Kennesaw State University, where he teaches courses in cybersecurity and serves as the Director of Education and Outreach at the KSU Institute for Cybersecurity Workforce Development. With 26 years of experience in the IT industry prior to his academic career, which began in 2002, Dr. Mattord has held various roles including application developer, database administrator, project manager, and information security practitioner. His practical expertise was further enhanced during his tenure as the Manager of Corporate Information Technology Security at Georgia-Pacific Corporation. Additionally, he has taught as an adjunct professor at several institutions and is a co-author of key textbooks in the field, including Principles of Information Security and Management of Information Security. Dr. Mattord earned his Ph.D. in Information Systems with a focus on Information Security from Nova Southeastern University.
Leading Authority in Information Security at Kennesaw State University
Dr. Michael Whitman is a Professor of Information Security in the Information Systems and Security Department at Kennesaw State University, where he also serves as the Executive Director of the KSU Institute for Cybersecurity Workforce Development. With a Ph.D. in Management Information Systems, Dr. Whitman teaches both graduate and undergraduate courses in cybersecurity and has made significant contributions to the field through numerous publications in top academic journals. He is a co-author of several widely used textbooks in information security and has played a crucial role in establishing Kennesaw State as a National Center of Academic Excellence in Information Assurance and Cyber Defense Education, recognized by the National Security Agency and the Department of Homeland Security. Under his leadership, the university's cybersecurity programs have flourished, reflecting his commitment to advancing education and workforce development in this critical area.
Testimonials
Testimonials and success stories are a testament to the quality of this program and its impact on your career and learning journey. Be the first to help others make an informed decision by sharing your review of the course.
Frequently asked questions
Below are some of the most commonly asked questions about this course. We aim to provide clear and concise answers to help you better understand the course content, structure, and any other relevant information. If you have any additional questions or if your question is not listed here, please don't hesitate to reach out to our support team for further assistance.