- Cybersecurity
- Risk Management
- cybersecurity threats
- Cybersecurity Management
- Cybersecurity Risk Management
- NIST Risk Management Framework
- ISO Approach to Risk Management
Programa especializado: Cybersecurity Risk Management Frameworks
Exploring Cybersecurity Risk Management Frameworks. Understand the concepts and background of cybersecurity risk management frameworks
ofrecido por


Qué aprenderás
You will be able to define Cybersecurity risk and the discuss the threats that create it.
You will be prepared to explain the risk management process to assess and treat risk in the organization.
Define key concepts and terminology in Cybersecurity
Identify threats to cybersecurity
Habilidades que obtendrás
Acerca de este Programa Especializado
Proyecto de aprendizaje aplicado
Given a case study of a sample organization, learner will specify a risk management framework to manage cybersecurity risk. They will describe the resources needed to support this RMF and perform the initial steps of a risk management effort by identifying, classifying and prioritizing organizational assets and the threats to those assets.
We recommend learners have an understanding of computers and applications as well as prior work experience in cybersecurity or risk management.
We recommend learners have an understanding of computers and applications as well as prior work experience in cybersecurity or risk management.
Cómo funciona el programa especializado
Toma cursos
Un programa especializado de Coursera es un conjunto de cursos que te ayudan a dominar una aptitud. Para comenzar, inscríbete en el programa especializado directamente o échale un vistazo a sus cursos y elige uno con el que te gustaría comenzar. Al suscribirte a un curso que forme parte de un programa especializado, quedarás suscrito de manera automática al programa especializado completo. Puedes completar solo un curso: puedes pausar tu aprendizaje o cancelar tu suscripción en cualquier momento. Visita el panel principal del estudiante para realizar un seguimiento de tus inscripciones a cursos y tu progreso.
Proyecto práctico
Cada programa especializado incluye un proyecto práctico. Necesitarás completar correctamente el proyecto para completar el programa especializado y obtener tu certificado. Si el programa especializado incluye un curso separado para el proyecto práctico, necesitarás completar cada uno de los otros cursos antes de poder comenzarlo.
Obtén un certificado
Cuando completes todos los cursos y el proyecto práctico, obtendrás un Certificado que puedes compartir con posibles empleadores y tu red profesional.

Hay 4 cursos en este Programa Especializado
Cybersecurity Foundations for Risk Management
In order to manage the cybersecurity function business, you must first understand its language and its environment. This course covers the foundations of cybersecurity, including threats and vulnerabilities as well as the tools, technologies, and strategies used to manage it.
A General Approach to Risk Management
Every organization uses its information to support its business operations. When there are threats in the internal and external environments, they create the risk of information loss or damage. This course examines the design and construction of a risk management program, including policies and plans, to support the identification and treatment of risk to the organization’s information assets.
Dominant Risk Management Standards and Frameworks
Organizations with little experience in risk management will want to look to national and international organizations for guidance in designing and implementing their risk management efforts. There are two dominant organizations that offer guidance in this area: the U.S. National Institute for Standards in Technology (NIST) and the International Standards Organization.
Implementing a Risk Management Framework
The ultimate destination for a security manager is the Chief Information Security Officer (or Chief Security Officer) a senior executive role responsible for all cybersecurity operations in the organization. But how do you get from entry-level IT or security employee to the CISO’s office and what do you need to know when you get there? This course examines the career path and requirements to be an effective CISO, as well as the roles and responsibilities of the position.
ofrecido por

Sistema Universitario de Georgia
The University System of Georgia is composed of 28 higher education institutions including 4 research universities, 2 regional universities, 12 state universities, 13 state colleges and the Skidaway Institute of Oceanography. The Georgia Public Library System, encompassing 61 library systems throughout Georgia, is also part of the University System.
Preguntas Frecuentes
¿Cuál es la política de reembolsos?
¿Puedo inscribirme en un solo curso?
¿Hay ayuda económica disponible?
¿Puedo tomar este curso de manera gratuita?
¿Este curso es 100 % en línea? ¿Necesito asistir a alguna clase en persona?
¿Cuánto tiempo se necesita para completar un programa especializado?
What background knowledge is necessary?
Do I need to take the courses in a specific order?
¿Recibiré crédito universitario por completar el programa especializado?
What will I be able to do upon completing the Specialization?
¿Tienes más preguntas? Visita el Centro de Ayuda al Alumno.