Learn essential cybersecurity concepts, governance frameworks, and compliance requirements with focus on CIA triad.
Learn essential cybersecurity concepts, governance frameworks, and compliance requirements with focus on CIA triad.
This course cannot be purchased separately - to access the complete learning experience, graded assignments, and earn certificates, you'll need to enroll in the full Introduction to Cybersecurity & Risk Management Specialization program. You can audit this specific course for free to explore the content, which includes access to course materials and lectures. This allows you to learn at your own pace without any financial commitment.
4.6
(147 ratings)
11,657 already enrolled
Instructors:
English
What you'll learn
Understand and apply the CIA triad framework
Design effective security governance structures
Navigate legal and regulatory compliance requirements
Develop security policies, standards, and procedures
Align security strategies with business objectives
Implement risk-based security governance
Skills you'll gain
This course includes:
0.7 Hours PreRecorded video
3 quizzes, 1 assignment
Access on Mobile, Tablet, Desktop
FullTime access
Shareable certificate
Get a Completion Certificate
Share your certificate with prospective employers and your professional network on LinkedIn.
Created by
Provided by

Top companies offer this course to their employees
Top companies provide this course to enhance their employees' skills, ensuring they excel in handling complex projects and drive organizational success.





There are 4 modules in this course
This course provides a comprehensive introduction to cybersecurity governance and compliance. Students explore fundamental cybersecurity concepts through the CIA triad framework, security governance design, and the NIST cybersecurity framework. The curriculum covers critical aspects of legal and regulatory compliance, policy development, and strategic security planning. Through case studies and practical exercises, participants learn to align security strategies with business objectives while ensuring regulatory compliance.
Introduction to Cybersecurity
Module 1 · 2 Hours to complete
Security Governance
Module 2 · 2 Hours to complete
Legal & Regulatory Compliance
Module 3 · 2 Hours to complete
Policies, Standards, & Procedures
Module 4 · 2 Hours to complete
Fee Structure
Instructor
Senior Cybersecurity Consultant and Instructor
Jacob Horne is a Senior Cybersecurity Consultant with CMTC, specializing in providing training and technical support to small and medium-sized manufacturers in California. His expertise lies in helping these businesses navigate complex cybersecurity compliance requirements, particularly those related to the Defense Federal Acquisition Regulation Supplement (DFARS) and Cybersecurity Maturity Model Certification (CMMC) for the Defense Industrial Base. A U.S. Navy veteran with over 13 years of cybersecurity experience, Jacob has led high-performance teams across various sectors. His career includes serving as an intelligence analyst and cyber operations planner for the NSA, as well as managing cybersecurity for U.S. Navy and U.S. Army units. Jacob has also worked as a Senior Principal Cybersecurity Engineer at Northrop Grumman, specializing in the NIST Risk Management Framework for DOD systems. As an educator, Jacob serves as the lead instructor for UCLA Extension’s Cybersecurity Bootcamp, where he has helped dozens of students launch successful careers in cybersecurity.
Testimonials
Testimonials and success stories are a testament to the quality of this program and its impact on your career and learning journey. Be the first to help others make an informed decision by sharing your review of the course.
4.6 course rating
147 ratings
Frequently asked questions
Below are some of the most commonly asked questions about this course. We aim to provide clear and concise answers to help you better understand the course content, structure, and any other relevant information. If you have any additional questions or if your question is not listed here, please don't hesitate to reach out to our support team for further assistance.