Learn essential cybersecurity practices for managing personnel and vendor risks, from training to risk management.
Learn essential cybersecurity practices for managing personnel and vendor risks, from training to risk management.
This course cannot be purchased separately - to access the complete learning experience, graded assignments, and earn certificates, you'll need to enroll in the full Introduction to Cybersecurity & Risk Management Specialization program. You can audit this specific course for free to explore the content, which includes access to course materials and lectures. This allows you to learn at your own pace without any financial commitment.
4.7
(32 ratings)
2,340 already enrolled
Instructors:
English
What you'll learn
Implement effective security education and training programs
Develop comprehensive personnel security controls
Manage vendor risks and supply chain threats
Evaluate security considerations in acquisitions
Create and maintain security awareness programs
Skills you'll gain
This course includes:
0.62 Hours PreRecorded video
4 quizzes, 4 peer reviews
Access on Mobile, Tablet, Desktop
FullTime access
Shareable certificate
Closed caption
Get a Completion Certificate
Share your certificate with prospective employers and your professional network on LinkedIn.
Created by
Provided by

Top companies offer this course to their employees
Top companies provide this course to enhance their employees' skills, ensuring they excel in handling complex projects and drive organizational success.





There are 4 modules in this course
This comprehensive course covers the essential aspects of personnel and third-party security in organizations. Students learn to implement effective security education and training programs, understand personnel security controls, and manage vendor risks. The curriculum includes practical case studies on social engineering, employee security, ransomware, and data breaches. Special emphasis is placed on acquisition strategy and supply chain security. Through peer-reviewed assignments, students gain hands-on experience in applying security principles to real-world scenarios.
Education, Training, & Awareness
Module 1 · 2 Hours to complete
Personnel Security
Module 2 · 2 Hours to complete
Vendor Risk Management
Module 3 · 2 Hours to complete
Acquisition Strategy
Module 4 · 2 Hours to complete
Fee Structure
Instructor
Profile of Qasim Ijaz
Qasim Ijaz is an accomplished Offensive Security Lead at the University of California, Irvine, specializing in risk management and offensive security. With extensive experience in executing security measures compliant with various frameworks such as NIST RMF, HIPAA, and PCI-DSS, he has successfully identified and remediated significant security vulnerabilities at the enterprise level. His interests encompass healthcare security, cybersecurity policy, and Windows penetration testing. Qasim holds a Master of Science in Cybersecurity and a Master of Business Administration from the University of Maryland Global Campus, along with certifications including Offensive Security Certified Professional (OSCP) and Certified Red Team Professional (CRTP).
Testimonials
Testimonials and success stories are a testament to the quality of this program and its impact on your career and learning journey. Be the first to help others make an informed decision by sharing your review of the course.
4.7 course rating
32 ratings
Frequently asked questions
Below are some of the most commonly asked questions about this course. We aim to provide clear and concise answers to help you better understand the course content, structure, and any other relevant information. If you have any additional questions or if your question is not listed here, please don't hesitate to reach out to our support team for further assistance.