Module #1 Introduction to Cybersecurity Governance and Compliance Overview of the importance of cybersecurity governance and compliance, including the role of governance in cybersecurity, and the consequences of non-compliance.
Module #2 Cybersecurity Governance Frameworks Exploration of prominent cybersecurity governance frameworks, including NIST, ISO 27001, and COBIT, and their application in different organizations.
Module #3 Cybersecurity Risk Management Understanding cybersecurity risk management, including risk assessment, risk analysis, and risk mitigation strategies.
Module #4 Compliance Regulations and Standards Overview of major compliance regulations and standards, including HIPAA, PCI-DSS, GDPR, and SOX, and their implications on cybersecurity.
Module #5 Cybersecurity Governance Structures Exploring different cybersecurity governance structures, including the three lines of defense model, and the role of the CISO and other cybersecurity leaders.
Module #6 Cybersecurity Policy Development Guidance on developing effective cybersecurity policies, including policy components, and policy implementation and maintenance.
Module #7 Cybersecurity Awareness and Training The importance of cybersecurity awareness and training, including strategies for promoting a culture of cybersecurity within an organization.
Module #8 Third-Party Risk Management Managing third-party risks, including vendor risk assessments, contract reviews, and ongoing monitoring and evaluation.
Module #9 Incident Response and Management Developing incident response plans, including incident detection, response, and post-incident activities.
Module #10 Compliance Monitoring and Auditing Techniques for monitoring and auditing compliance, including the role of internal audits, and continuous compliance monitoring.
Module #11 Risk Assessment and Analysis Conducting risk assessments and analysis, including threat modeling, vulnerability assessments, and risk scoring.
Module #12 Cybersecurity Control Implementation Implementing cybersecurity controls, including technical controls, physical controls, and administrative controls.
Module #13 Cloud Security Governance Governance considerations for cloud security, including cloud security architectures, and cloud security controls.
Module #14 Cybersecurity for IoT and OT Systems Unique cybersecurity considerations for IoT and OT systems, including threat modeling and risk management strategies.
Module #15 Cybersecurity Governance for Small and Medium-Sized Enterprises Cybersecurity governance considerations for small and medium-sized enterprises, including resource constraints and prioritization strategies.
Module #16 Cybersecurity Governance for Large Enterprises Cybersecurity governance considerations for large enterprises, including enterprise risk management and global compliance requirements.
Module #17 Cybersecurity Governance in the Supply Chain Managing cybersecurity risks in the supply chain, including supplier risk assessments and contractual requirements.
Module #18 Cybersecurity Governance for Mergers and Acquisitions Cybersecurity governance considerations for mergers and acquisitions, including due diligence and post-acquisition integration.
Module #19 Cybersecurity Governance for Data Protection Governance considerations for data protection, including data classification, data loss prevention, and encryption.
Module #20 Cybersecurity Governance for Identity and Access Management Governance considerations for identity and access management, including identity management, authentication, and access control.
Module #21 Cybersecurity Governance for Network Security Governance considerations for network security, including network architecture, segmentation, and monitoring.
Module #22 Cybersecurity Governance for Endpoint Security Governance considerations for endpoint security, including endpoint protection, patch management, and software updates.
Module #23 Cybersecurity Governance for Secure Development Governance considerations for secure development, including secure coding practices, and secure development life cycles.
Module #24 Cybersecurity Governance Metrics and Reporting Developing metrics and reporting for cybersecurity governance, including key performance indicators (KPIs) and dashboards.
Module #25 Course Wrap-Up & Conclusion Planning next steps in Cybersecurity Governance and Compliance career