Course Details
Course

A Primer on Cyber Security Programs and Roles 2 CPE


Course Duration: 2 Hours
Course Rating:
Course Enrollments: 6604 Enrolled
Mode of Delivery: on_demand
Course Level: Basic
Study Area: Information Technology

Advancements in technology have raised the level of acknowledgement of threats in the cyber age. These threats touch both the business world and personal lives. Information technology is no longer a “back-office” function.  Once considered a process area that was solely part of the Chief Information Officer’s domain, companies must now acknowledge that whether the threats are internal or external, they are very real and can and will cause harm to many organizations in many ways.  As a result, it is imperative that professionals across the company understand and be prepared to deal with the multitude of ever-growing cyber threats.   

Outside of being aware, organizations must begin to implement cyber risk management programs. This includes strategic risk assessments that evaluate aspects of your organization’s cyber presence. This segment focuses on components and roles for a cyber program. 

Future segments will focus on building a cyber security risk assessment and dissecting the steps of the National Institute of Standards and Technology (NIST) cyber risk framework.

Training for all programs related to cyber security by this trainer are utilizing the framework of the National Institute of Standards and Technology (NIST) as a model. This information is freely available in the public domain. For more detailed information on the framework please refer to NIST.org.

Prerequisites

No Advanced Preparation or Prerequisites are needed for this course. However, it is recommended to take the other courses in the series prior to completing this one.

Learning Objective
  • Identify the elements required of a cyber program.
  • Explore the categories of cyber security.
  • Identify the top 10 vulnerabilities per the Open Web Application Security Project (OWASP).
  • Explore the types/categories of cyber threats.
  • Identify roles in a cyber risk management program.
  • Identify focus areas for cyber programs.
  • Explore basic components of the National Institute of Standards and Technology (NIST) framework.

Last updated/reviewed: March 8, 2024

632 Reviews

Lesson Questions and Answers0 Questions

Ask the instructor a question about this lesson

Your question will be sent to the instructor, who will answer as soon as possible.

Profile picture of instructor
Lynn Fountain
CPA, CGMA, CRMA, MBA, cPIA, Consultant, Author, Trainer
Progress
0%