In today’s rapidly evolving threat landscape, cyber resilience is no longer a luxury—it’s a necessity. This course empowers Chief Information Security Officers (CISOs) and cybersecurity leaders with the knowledge and strategies needed to design, implement, and maintain robust security programs capable of withstanding and recovering from cyberattacks.

Genießen Sie unbegrenztes Wachstum mit einem Jahr Coursera Plus für 199 $ (regulär 399 $). Jetzt sparen.

Empfohlene Erfahrung
Was Sie lernen werden
Defend against cybersecurity threats and accelerate recovery processes
Implement network protection strategies against ransomware and phishing
Understand key tools and practices for reducing cyber risk
Kompetenzen, die Sie erwerben
- Kategorie: Business Continuity Planning
- Kategorie: Zero Trust Network Access
- Kategorie: Cyber Governance
- Kategorie: Endpoint Security
- Kategorie: Security Controls
- Kategorie: Data Security
- Kategorie: Cybersecurity
- Kategorie: Cyber Risk
- Kategorie: AI Security
- Kategorie: Enterprise Security
- Kategorie: Cyber Security Strategy
- Kategorie: Cyber Attacks
- Kategorie: Security Management
- Kategorie: Cyber Security Policies
- Kategorie: Disaster Recovery
- Kategorie: Incident Response
- Kategorie: Cyber Threat Hunting
- Kategorie: Incident Management
- Kategorie: Identity and Access Management
- Kategorie: Security Awareness
Wichtige Details

Zu Ihrem LinkedIn-Profil hinzufügen
Dezember 2025
14 Aufgaben
Erfahren Sie, wie Mitarbeiter führender Unternehmen gefragte Kompetenzen erwerben.

In diesem Kurs gibt es 14 Module
In this section, we examine ransomware attack vectors, incident response protocols, and network resilience strategies to strengthen organizational cybersecurity defenses.
Das ist alles enthalten
2 Videos3 Lektüren1 Aufgabe
In this section, we explore two-factor authentication, NIST 800-63-3B password requirements, and password manager usage to enhance digital security and identity protection.
Das ist alles enthalten
1 Video3 Lektüren1 Aufgabe
In this section, we examine how security policies align with legal requirements, differentiate between policies and procedures, and demonstrate due diligence in risk mitigation.
Das ist alles enthalten
1 Video3 Lektüren1 Aufgabe
This section covers risk identification and impact evaluation to support business security decisions.
Das ist alles enthalten
1 Video2 Lektüren1 Aufgabe
In this section, we explore endpoint security strategies, including EDR, NAC, and Zero Trust, to protect remote work environments and test home firewall configurations effectively.
Das ist alles enthalten
1 Video4 Lektüren1 Aufgabe
In this section, we explore offline backups, backup testing, business continuity, and disaster recovery to ensure data availability and operational resilience.
Das ist alles enthalten
1 Video4 Lektüren1 Aufgabe
In this section, we explore building a security-aware culture through training, engagement, and tracking. Key concepts include shared responsibility, mandatory compliance, and gamification for effective cybersecurity practices.
Das ist alles enthalten
1 Video2 Lektüren1 Aufgabe
In this section, we explore vulnerability prioritization, CVSS scoring, and secure coding practices to reduce organizational risk and enhance security posture.
Das ist alles enthalten
1 Video4 Lektüren1 Aufgabe
In this section, we explore asset inventory, change management, and mobile device management (MDM) to enhance network visibility and security through structured processes and effective strategies.
Das ist alles enthalten
1 Video2 Lektüren1 Aufgabe
In this section, we explore encryption for data at rest and in transit, analyze PII definitions, and evaluate third-party vendor risks to implement defense in depth for data protection.
Das ist alles enthalten
1 Video4 Lektüren1 Aufgabe
In this section, we explore advanced endpoint security strategies, including EDR, MDR, XDR, and zero trust, emphasizing practical implementation and integration over product acquisition.
Das ist alles enthalten
1 Video2 Lektüren1 Aufgabe
In this section, we explore secure configuration baselines by analyzing risk, controls, and budget with real-world strategies.
Das ist alles enthalten
1 Video4 Lektüren1 Aufgabe
In this section, we classify data and assets by impact level, implement asset inventory, and design monitoring and segmentation strategies for enhanced security.
Das ist alles enthalten
1 Video2 Lektüren1 Aufgabe
In this section, we examine strategies to enhance cyber resilience in AI systems, focusing on secure frameworks, bias analysis, and risk evaluation for responsible AI deployment.
Das ist alles enthalten
1 Video4 Lektüren1 Aufgabe
Dozent

von
Mehr von Security entdecken

Packt
Status: Kostenloser TestzeitraumMacquarie University
Status: Kostenloser TestzeitraumInfosec
Status: Vorschau
Warum entscheiden sich Menschen für Coursera für ihre Karriere?




Häufig gestellte Fragen
Yes, you can preview the first video and view the syllabus before you enroll. You must purchase the course to access content not included in the preview.
If you decide to enroll in the course before the session start date, you will have access to all of the lecture videos and readings for the course. You’ll be able to submit assignments once the session starts.
Once you enroll and your session begins, you will have access to all videos and other resources, including reading items and the course discussion forum. You’ll be able to view and submit practice assessments, and complete required graded assignments to earn a grade and a Course Certificate.
Weitere Fragen
Finanzielle Unterstützung verfügbar,




