Instructor for this course

Advancements in technology have raised the level of acknowledgement of threats in the cyber age. These threats touch both the business world and personal lives. Information technology is no longer a “back-office” function.  Once considered a process area that was solely part of the Chief Information Officer’s domain, companies must now acknowledge that whether the threats are internal or external, they are very real and can and will cause harm to many organizations in many ways.  As a result, it is imperative that professionals across the company understand and be prepared to deal with the multitude of ever-growing cyber threats.   

Outside of being aware, organizations must begin to implement cyber risk management programs.This includes strategic risk assessments that evaluate aspects of your organization’s cyber presence. This segment focuses on components and roles for a cyber program. 

Future segments will focus on building a cyber security risk assessment and dissecting the steps of the National Institute of Standards and Technology (NIST) cyber risk framework.

Learning Objectives

  • Identify the elements required of a cyber program.
  • Explore the categories of cyber security.
  • Identify the top 10 vulnerabilities per the Open Web Application Security Project (OWASP).
  • Explore the types/categories of cyber threats.
  • Identify roles in a cyber risk management program.
  • Identify focus areas for cyber programs.
  • Explore basic components of the National Institute of Standards and Technology (NIST) framework.
Last updated/reviewed: October 24, 2018

Included In Certifications

This course is included in the following Certification Programs:

13 CoursesCorporate Cyber Security Certification

  1. Cyber Threat – The Modern-Day Fraud: Breaches and Actions
  2. A Primer on Cyber Security Programs and Roles
  3. Cyber Risk Management Frameworks and Concepts
  4. Cyber Risk Assessment - Identify Critical Assets
  5. Cyber Risk Assessment – Prioritize Assets for Protection
  6. Cyber Risk Assessment - Protect Assets from Threats
  7. Cyber Risk Assessment – Detect Threats Part One
  8. Cyber Risk Assessment – Detect Threats Part Two
  9. Cyber Risk Assessment – Respond to Incidents
  10. Cyber Risk Assessment – Recover from Incidents
  11. Measuring Cyber Risk Utilizing Tiers
  12. Personal Identity Theft
  13. The Business Identity Theft Crisis

10 Reviews (37 ratings)Reviews

Member's Profile
There is a mistake in review questions (write and wrong answers confused). Other than that, the course is good overview with some interesting details on history and current state of the cyber security
Member's Profile
The instructor was clear. I was a bit unsure about the critical infrastructure discussion until the latter portion of the presentation. Interesting information.
Member's Profile
Whilst covering things at 10,000 ft the module needs to somehow use more visual aids to bring each of the topics together, which I felt was lacking.
Anonymous Author
Helpful course that speaks to the various levels of cyber security and what makes a cyber security program function properly.
Anonymous Author
Good course - a lot of terminology and background information provded in understanding cyber security programs and roles.
Member's Profile
Good overview of it security issues. i look forward to learning more about the cyber security certificate to be offered.
Member's Profile
The course was well designed and effective in providing the required information relating to Cyber Security.
Anonymous Author
Excellent introduction to the NIST Cyber Risk Framework. I appreciate the OWASP Top 10 vulnerabilities.
Anonymous Author
Good in-depth information. This course was very informative
Anonymous Author
Good overview, applicable to many different disciplines.


Course Complexity: Foundational

No Advanced Preparation or Prerequisites are needed for this course. However, it is recommended to take the other courses in the series prior to completing this one.

Education Provider Information

Illumeo, Inc., 75 East Santa Clara St., Suite 1215, San Jose, CA 95113
For more information regarding this course, including complaint and cancellation policies, please contact our offices at (408) 400- 3993 or send an e-mail to .
Course Syllabus
  5:15Introduction to Cyber Programs and Roles
Cyber Programs and Roles
  10:49History of The Internet
  10:06Cyber Program
  9:14Types of Cyber Security
  12:09OWASP Top 10
  6:44Types of Cyber Threats
  5:05Roles and Actions
  9:56Role Responsibilities
  2:32Focus Areas
  7:13Cyber Risk Programs
  9:18Common Policies
  3:10Procedures and Standards
  1:33:48Cyber Programs and Roles
Supporting Materials
  PDFSlides: Cyber Programs and Roles
  PDFCyber Programs and Roles Glossary/Index