Introduction to Cyber Security: security management for IT
in Cybersecurity
4.5
(35 Ratings)
1,990 Students
Created by
David Clinton
About this course
What You'll Learn
Recognize the most significant cyber security risks to your IT infrastructure
Conduct a targeted risk assessment tailored to your systems
Grasp the key principles behind implementing risk controls in security management
Learn how to integrate both internal and external security audits into your strategy
Develop a comprehensive cyber security incident response plan to mitigate threats effectively
Design an incident recovery playbook focused on security management
Requirements
No prior knowledge or technical skills required to take this course
A willingness to understand the complexities of cyber security and improve security management practices
Description
Cyber security threats are increasing every day, and if your systems aren’t properly secured, you’re at risk!
As IT professionals—whether as managers, administrators, or developers—it's our duty to ensure that our systems and applications run **securely and efficiently**. This includes safeguarding connectivity for teams and end users. However, **no matter how many security measures we put in place, cyber threats are constantly evolving**, creating new vulnerabilities.
You know **security should be a top priority**, but with so many risks and evolving threats, it can be difficult to determine **where to start**.
This **practical and results-driven** cyber security course will walk you through the **core principles behind effective security management**. You’ll gain an understanding of **cyber security awareness**, how to **conduct risk assessments**, establish **strong security control measures**, and create structured **incident management and recovery plans**.
By the end of this course, you won’t necessarily become an expert in penetration testing, log analysis, or vulnerability scanning tools. **Instead, you'll develop a strategic security mindset**, enabling you to determine **which security measures and tools best fit your organization’s needs**. This ensures you leave **no gaps in your protection**.
Don't leave your IT infrastructure vulnerable—enroll today and take control of your cyber security strategy!
Who This Course Is For
IT project managers aiming to enhance security in their deployment strategies
System administrators looking to strengthen the security of their infrastructure
Software developers and IT professionals responsible for system security
Anyone interested in pursuing a career in cyber security management
Comments (0)
1. Implementing Cyber Security Tools and Methodologies
2 Parts
0. Promo Video.mp4
9.46 MB
1. Introducing the Cyber Security Problem.mp4
26.19 MB
2. Identifying the Modern Threat Environment
2 Parts
1. Understanding the Scary Stuff.mp4
76.70 MB
2. Building a Risk Assessment.mp4
32.56 MB
3. Understanding Incident Prevention
3 Parts
1. Applying Risk Controls to Your Systems.mp4
25.51 MB
2. Controlling Your Network Exposure.mp4
33.67 MB
3. Incorporating Audits Into Your Workflow.mp4
59.25 MB
4. Preparing for Incident Response and Recovery
2 Parts
1. Incident Management.mp4
14.34 MB
2. Plans and Playbooks.mp4
51.10 MB
5. Utilizing Resources and Opportunities
2 Parts
1. Taking Your Next Steps.mp4
49.41 MB
2.1. Course Review.mp4
13.12 MB

0
0 Reviews