Course list

When it comes to cyber threats, every organization should strive to protect themselves and their users, and it is crucial to have a plan in place to protect your organization. Threats, whether big or small, have the potential to harm an organization, so understanding the digital threat landscape is critical for organizations to build effective security measures and risk mitigation strategies.

In this course, you will discover how to identify and classify cybersecurity threats to protect your organization. You will be introduced to different types of threats and vulnerabilities as well as the potential impacts each threat may have on organizational assets, gaining tools to help you identify these threats and minimize their impact. You will be introduced to cybersecurity frameworks, such as NIST, and best practices to protect possible targets within an organization. By the end of this course, you will have a foundation of the threat landscape to leverage to better protect your organization.

There are different types of risks associated with the protection of assets, so understanding the significance of your assets will allow for planning ahead and budgeting realistically. Every organization needs to allocate spending on their cybersecurity budget based on their specific needs, but the allocation of cybersecurity budgets can vary depending on the industry and size of the organization.

In this course, you will analyze various company controls to better strategize about cybersecurity for your organization. You will start by identifying what needs to be protected and prioritizing investments. You will then be introduced to different types of controls and assets as well as common categories of budget allocations for cybersecurity. Finally, you will determine how your company's budget can be used for cybersecurity and identify ways to maximize your cybersecurity budget in order to protect your assets. By the end of this course, you will be equipped with practical skills, strategies, and approaches to make sound cybersecurity decisions.

You are required to have completed the following courses or have equivalent experience before taking this course:

  • Analyzing Cybersecurity Threats

Being able to evaluate the overall security status of your organization's product, sites, or teams at any point is critical, and conducting a thorough and applicable risk analysis is the key to this strategy.

In this course, you will assess an organization's security status to determine strengths and weaknesses. You will be introduced to the concept of security posture, and you will consider key areas to focus on when analyzing an existing security posture. You will also determine the best set of controls to strengthen security and better support weak spots to protect your organization. Finally, you will gain strategies for implementing future controls to protect your company, setting you up for success in risk analysis and planning efforts.

You are required to have completed the following courses or have equivalent experience before taking this course:

  • Analyzing Cybersecurity Threats
  • Assessing Cybersecurity Company Controls

Cyber communications are now ubiquitous across all types of organizations, but the necessary protections and policies surrounding their security are missing in many organizations. Every company needs to formulate policies related to privacy, cybersecurity, access, and information security for its internal and external users, and it is crucial to ensure that these policies are in line with applicable regulations, legal norms, and industry standards. Cyber communications are no exception.

In this course, you will discuss the key components of a cyber communications strategy. First, you will explore various relevant regulatory landscapes, both nationally and internationally. You will then identify who your audience is for internal and external communication plans. Finally, you will apply best practices to create both internal and external communication plans. By the end of this course, you will have new knowledge and practice to apply to your organization's policies and plans for cyber communications.

You are required to have completed the following courses or have equivalent experience before taking this course:

  • Analyzing Cybersecurity Threats
  • Assessing Cybersecurity Company Controls
  • Conducting Cybersecurity Risk Analysis and Planning

How It Works

Watch the Video

Request Information Now by completing the form below.

Act today—courses are filling fast.
This site is protected by reCAPTCHA and the Google Privacy Policy and Terms of Service apply.