HIGHLIGHTS

Here are some of the highlights for this micro-credential.

  • No admission requirements, no application process, no pre-requisites, open to anyone

  • Learn at your own pace using a computer, tablet or smartphone

  • Take up to 90 days to complete the course

  • Receive a certificate of course completion and digital badge for successfully completing the course which can be shared on social media (e.g. LinkedIn, Facebook, Twitter), downloaded as a PDF, or even embedded in an email signature

Learning Outcomes

Upon successful completion of this micro-credential, learners should be able to:

  • Recognize sound Cybersecurity Governance Practices and Environment Scan

  • Explain General Cybersecurity Governance related to Technical Controls, Recovery Protocols, and Vendor Management

  • Plan for General Cybersecurity Governance related to Technical Controls, Recovery Protocols, and Vendor Management

  • Examine case studies related to Cybersecurity Governance

Micro-credential Overview

In this 13-hr online course, learners will explore Cybersecurity Governance Practices and Environment Scan.  They will learn how to plan for general Cybersecurity Governance related to Technical Controls, Recovery Protocols, and Vendor Management.

Review the curriculum below to see the topics covered.  

Learners who successfully complete the course will earn a digital badge and certificate of course completion that can be downloaded and shared via social media. 

You will have access to the course for 90 days to work through the content.

Curriculum

  • 1

    Welcome to the micro-credential!

    • Before we begin...

    • Welcome and Micro-credential Information

    • Navigation

    • Starting a Lesson

    • Modes of Learning

    • Learning Outcomes

    • Discussion Forum: Learner Engagement

    • Technical Discussion Forum

  • 2

    Course Introduction

    • Acronyms List

    • Terms (Within the Context of Cybersecurity)

    • Terms (Within the Context of Cybersecurity) - Continued

    • Reflection

    • Videos To Watch

  • 3

    Lesson 1: Intro to Cybersecurity Governance

  • 4

    Lesson 2: Sound Cybersecurity Governance Practices

    • Lesson 2: Learning Objectives

    • Lesson 2: Introduction

    • Lesson 2: Cybersecurity Governance Practices

    • Lesson 2: Quiz 1

    • Lesson 2: Environmental Scans and Cybersecurity Audit Preparedness

    • Lesson 2: Technical Controls, Cyberattack Preparedness and Response Planning

    • Lesson 2: Knowledge Check

    • Lesson 2: Quiz 2

    • Lesson 2: Human Resources Cybersecurity Governance Policies

    • Lesson 2: Recovery Planning and Incident Preparedness and Action Planning

    • Lesson 2: Vendor Management Policies

    • Lesson 2: Knowledge Check

    • Lesson 2: Summary

    • Lesson 2: Final Quiz

  • 5

    Lesson 3: General Cybersecurity Governance

    • Lesson 3: Learning Objectives

    • Lesson 3: Introduction

    • Lesson 3: General Policy Concerns

    • Lesson 3: Protected Data Policies

    • Lesson 3: Quiz 1

    • Lesson 3: Threat Prediction

    • Lesson 3: Accidental disclosure of protected data

    • Lesson 3: Accidental data corruption

    • Lesson 3: Knowledge Check

    • Lesson 3: Knowledge Check

    • Lesson 3: Summary

    • Lesson 3: Final Quiz

  • 6

    Lesson 4: Governance Related to Technical Controls

    • Lesson 4: Learning Objectives

    • Lesson 4: Introduction

    • Lesson 4: Organizational Preparedness

    • Lesson 4: General Technical Policies

    • Lesson 4: Knowledge Check

    • Lesson 4: Malware and Ransomware

    • Lesson 4: Phishing

    • Lesson 4: DDoS

    • Lesson 4: Quiz 1

    • Lesson 4: Side-Loading Apps

    • Lesson 4: Side Channel - Rainbow Tables

    • Lesson 4: Side Channel - Tempest

    • Lesson 4: Knowledge Check

    • Lesson 4: Knowledge Check

    • Lesson 4: Summary

    • Lesson 4: Final Quiz

  • 7

    Lesson 5: Governance Related to Recovery Protocols

    • Lesson 5: Learning Objectives

    • Lesson 5: Introduction

    • Lesson 5: Incident Management

    • Lesson 5: Before an Incident

    • Lesson 5: Quiz 1

    • Lesson 5: During an Incident

    • Lesson 5: After an Incident

    • Lesson 5: Knowledge Check

    • Lesson 5: Summary

    • Lesson 5: Final Quiz

  • 8

    Lesson 6: Governance Related to Vendor Management

    • Lesson 6: Learning Objectives

    • Lesson 6: Introduction

    • Lesson 6: Standard Vendor Contract Language

    • Lesson 6: Quiz 1

    • Lesson 6: Due Diligence on Prospective Vendors

    • Lesson 6: Topics to Consider

    • Lesson 6: Knowledge Check

    • Lesson 6: Knowledge Check

    • Lesson 6: Summary

    • Lesson 6: Final Quiz

  • 9

    Case Study: Colonial Pipeline Ransomware Attack

    • Case Study: Colonial Pipeline Ransomware Attack Part I

    • Case Study: Colonial Pipeline Ransomware Attack Part II

    • Case Study: Colonial Pipeline Ransomware Attack Part III

    • Case Study: Knowledge Check

    • Case Study Discussion Forum

  • 10

    Next steps

    • Lessons References

    • Case Study References

    • Summary

    • You're Almost Done

    • Before you go...

Reviews (Coming Soon)