In today’s rapidly evolving threat landscape, cyber resilience is no longer a luxury—it’s a necessity. This course empowers Chief Information Security Officers (CISOs) and cybersecurity leaders with the knowledge and strategies needed to design, implement, and maintain robust security programs capable of withstanding and recovering from cyberattacks.

Profitez d'une croissance illimitée avec un an de Coursera Plus pour 199 $ (régulièrement 399 $). Économisez maintenant.

Expérience recommandée
Ce que vous apprendrez
Defend against cybersecurity threats and accelerate recovery processes
Implement network protection strategies against ransomware and phishing
Understand key tools and practices for reducing cyber risk
Compétences que vous acquerrez
- Catégorie : Security Controls
- Catégorie : Security Management
- Catégorie : Data Security
- Catégorie : Cybersecurity
- Catégorie : Disaster Recovery
- Catégorie : Cyber Threat Hunting
- Catégorie : Security Awareness
- Catégorie : Identity and Access Management
- Catégorie : Cyber Security Strategy
- Catégorie : Cyber Attacks
- Catégorie : Cyber Risk
- Catégorie : Enterprise Security
- Catégorie : Cyber Governance
- Catégorie : Cyber Security Policies
- Catégorie : AI Security
- Catégorie : Zero Trust Network Access
- Catégorie : Incident Response
- Catégorie : Endpoint Security
- Catégorie : Incident Management
- Catégorie : Business Continuity Planning
Détails à connaître

Ajouter à votre profil LinkedIn
décembre 2025
14 devoirs
Découvrez comment les employés des entreprises prestigieuses maîtrisent des compétences recherchées

Il y a 14 modules dans ce cours
In this section, we examine ransomware attack vectors, incident response protocols, and network resilience strategies to strengthen organizational cybersecurity defenses.
Inclus
2 vidéos3 lectures1 devoir
In this section, we explore two-factor authentication, NIST 800-63-3B password requirements, and password manager usage to enhance digital security and identity protection.
Inclus
1 vidéo3 lectures1 devoir
In this section, we examine how security policies align with legal requirements, differentiate between policies and procedures, and demonstrate due diligence in risk mitigation.
Inclus
1 vidéo3 lectures1 devoir
This section covers risk identification and impact evaluation to support business security decisions.
Inclus
1 vidéo2 lectures1 devoir
In this section, we explore endpoint security strategies, including EDR, NAC, and Zero Trust, to protect remote work environments and test home firewall configurations effectively.
Inclus
1 vidéo4 lectures1 devoir
In this section, we explore offline backups, backup testing, business continuity, and disaster recovery to ensure data availability and operational resilience.
Inclus
1 vidéo4 lectures1 devoir
In this section, we explore building a security-aware culture through training, engagement, and tracking. Key concepts include shared responsibility, mandatory compliance, and gamification for effective cybersecurity practices.
Inclus
1 vidéo2 lectures1 devoir
In this section, we explore vulnerability prioritization, CVSS scoring, and secure coding practices to reduce organizational risk and enhance security posture.
Inclus
1 vidéo4 lectures1 devoir
In this section, we explore asset inventory, change management, and mobile device management (MDM) to enhance network visibility and security through structured processes and effective strategies.
Inclus
1 vidéo2 lectures1 devoir
In this section, we explore encryption for data at rest and in transit, analyze PII definitions, and evaluate third-party vendor risks to implement defense in depth for data protection.
Inclus
1 vidéo4 lectures1 devoir
In this section, we explore advanced endpoint security strategies, including EDR, MDR, XDR, and zero trust, emphasizing practical implementation and integration over product acquisition.
Inclus
1 vidéo2 lectures1 devoir
In this section, we explore secure configuration baselines by analyzing risk, controls, and budget with real-world strategies.
Inclus
1 vidéo4 lectures1 devoir
In this section, we classify data and assets by impact level, implement asset inventory, and design monitoring and segmentation strategies for enhanced security.
Inclus
1 vidéo2 lectures1 devoir
In this section, we examine strategies to enhance cyber resilience in AI systems, focusing on secure frameworks, bias analysis, and risk evaluation for responsible AI deployment.
Inclus
1 vidéo4 lectures1 devoir
Instructeur

Offert par
En savoir plus sur Security

Packt
Statut : Essai gratuitMacquarie University
Statut : Essai gratuitInfosec
Statut : Prévisualisation
Pour quelles raisons les étudiants sur Coursera nous choisissent-ils pour leur carrière ?




Foire Aux Questions
Yes, you can preview the first video and view the syllabus before you enroll. You must purchase the course to access content not included in the preview.
If you decide to enroll in the course before the session start date, you will have access to all of the lecture videos and readings for the course. You’ll be able to submit assignments once the session starts.
Once you enroll and your session begins, you will have access to all videos and other resources, including reading items and the course discussion forum. You’ll be able to view and submit practice assessments, and complete required graded assignments to earn a grade and a Course Certificate.
Plus de questions
Aide financière disponible,




