This course takes a deeper dive into concepts introduced in the first course, with an emphasis on recognizing the focus of the CISSP eight security domains, steps of risk management, security frameworks and controls (e.g., NIST, CIA triad, OWASP), as well as common security threats, risks, and vulnerabilities. Additionally, learners are provided with an opportunity to explore and analyze SIEM data, use a playbook to respond to identified threats, risks, and vulnerabilities, and conduct a security audit.



Play It Safe: Manage Security Risks
This course is part of Google Cybersecurity Professional Certificate

Instructor: Google Career Certificates
Top Instructor
Access provided by Georgetown University
572,657 already enrolled
(10,054 reviews)
What you'll learn
Identify the primary threats, risks, and vulnerabilities to business operations
Examine how organizations use security frameworks and controls to protect business operations
Define commonly used Security Information and Event Management (SIEM) tools
Use a playbook to respond to threats, risks, and vulnerabilities
Skills you'll gain
- Vulnerability Management
- Incident Response
- Security Controls
- Cybersecurity
- Compliance Auditing
- Open Web Application Security Project (OWASP)
- Threat Management
- Information Assurance
- Enterprise Security
- Risk Analysis
- Information Systems Security
- Risk Management
- Security Information and Event Management (SIEM)
- Auditing
- Threat Detection
Details to know

Add to your LinkedIn profile
15 assignments
See how employees at top companies are mastering in-demand skills

Build your Computer Security and Networks expertise
- Learn new concepts from industry experts
- Gain a foundational understanding of a subject or tool
- Develop job-relevant skills with hands-on projects
- Earn a shareable career certificate from Google

There are 4 modules in this course
This module explains the focus of CISSP’s eight security domains. Then, primary threats, risks, and vulnerabilities to business operations are identified and defined, along with a discussion of the threats, risks, and vulnerabilities entry-level security analysts focus on most. Additionally, NIST’s Risk Management Framework (RMF) is introduced.
What's included
10 videos5 readings3 assignments1 plugin
This module explains security frameworks and controls, along with the core components of the confidentiality, integrity, and availability (CIA) triad. They will also learn about Open Web Application Security Project, recently renamed Open Worldwide Application Security Project® (OWASP), security principles and security audits.
What's included
11 videos6 readings6 assignments1 plugin
This module will explore industry leading security information and event management (SIEM) tools that are used by security professionals to protect business operations. You'll learn how entry-level security analysts use SIEM dashboards as part of their every day work.
What's included
7 videos4 readings3 assignments1 plugin
This module discusses the purposes and common uses of playbooks. They’ll also explore how cybersecurity professionals use playbooks to respond to identified threats, risks, and vulnerabilities.
What's included
7 videos6 readings3 assignments2 plugins
Earn a career certificate
Add this credential to your LinkedIn profile, resume, or CV. Share it on social media and in your performance review.
Instructor

Offered by
Why people choose Coursera for their career




Learner reviews
10,054 reviews
- 5 stars
86.22%
- 4 stars
11.52%
- 3 stars
1.56%
- 2 stars
0.35%
- 1 star
0.31%
Showing 3 of 10054
Reviewed on Aug 2, 2023
Holistic coverage of foundational concepts of what security is and how it is practiced in the industry, industry frameworks, before overlaying with contextualised cyber security practices.
Reviewed on Jan 25, 2024
It was wonderful and worth it, I am new to information technology but the arrangement of the course and the course outlines made more interested and willing and determined to keep going. Thumbs up.
Reviewed on Sep 26, 2023
Everything is perfectly explained. The real life experience being shared is also crucial to the overall success of the course, as it helps eliminate fear, or myth about Cybersecurity field.
Explore more from Computer Science

Open new doors with Coursera Plus
Unlimited access to 10,000+ world-class courses, hands-on projects, and job-ready certificate programs - all included in your subscription
Advance your career with an online degree
Earn a degree from world-class universities - 100% online
Join over 3,400 global companies that choose Coursera for Business
Upskill your employees to excel in the digital economy