Instructor for this course
more

Advancements in technology have raised the level of acknowledgement of threats in the cyber age. These threats touch both the business world and personal lives. Information technology is no longer a “back-office” function.  Once considered a process area that was solely part of the Chief Information Officer’s domain, companies must now acknowledge that whether the threats are internal or external, they are very real and can and will cause harm to many organizations in many ways.  As a result, it is imperative that professionals across the company understand and be prepared to deal with the multitude of ever-growing cyber threats.   

Outside of being aware, organizations must begin to implement cyber risk management programs.This includes strategic risk assessments that evaluate aspects of your organization’s cyber presence. This segment focuses on components and roles for a cyber program. 

Future segments will focus on building a cyber security risk assessment and dissecting the steps of the National Institute of Standards and Technology (NIST) cyber risk framework.

Learning Objectives

  • Identify the elements required of a cyber program.
  • Explore the categories of cyber security.
  • Identify the top 10 vulnerabilities per the Open Web Application Security Project (OWASP).
  • Explore the types/categories of cyber threats.
  • Identify roles in a cyber risk management program.
  • Identify focus areas for cyber programs.
  • Explore basic components of the National Institute of Standards and Technology (NIST) framework.
Last updated/reviewed: June 15, 2021

Included In Certifications

This course is included in the following Certification Programs:

13 CoursesCorporate Cyber Security Certification

  1. Cyber Threat – The Modern-Day Fraud: Breaches and Actions
  2. A Primer on Cyber Security Programs and Roles
  3. Cyber Risk Frameworks And Concepts
  4. Cyber Risk Framework - Identify Assets
  5. Cyber Risk Framework - Prioritize Assets
  6. Cyber Risk Framework - Protect Assets
  7. Cyber Risk Framework - Detect Part One
  8. Cyber Risk Framework - Detect Threats Part Two
  9. Cyber Risk Framework - Respond
  10. Cyber Risk Framework - Recover
  11. Cyber Risk Framework - Utilizing The Tier Approach
  12. Fraud and Personal Identity Theft
  13. Fraud and Business Identity Theft

85 Reviews (305 ratings)Reviews

5
Anonymous Author
An excellent course providing an in-depth review of cyber programs, security, and a multitude of considerations/steps organizations can take to mitigate risk and minimize exposure. I really enjoyed a refresher on the history of the Internet as well as Lynn's supporting materials which were incredibly easy to follow and comprehend!
5
Member's Profile
Great intro course for learning about the basics of cyber security, including defining the function of a Cyber Program. Top risks/threats are identified, as well as the roles of departments within a business and their responsibilities over ensuring proper cyber security. Basic controls are also identified for application.
5
Anonymous Author
The course provides a comprehensive overview of cyber security, cyber programs and other related matters. It also provides some methods and controls to apply for cyber security. Recommence the course to those who not in IT field but want to learn more about cyber security.
5
Anonymous Author
This course outlined the importance of developing, implementing, and monitoring a cybersecurity program within a company. It's a good reminder of how quickly our technology has evolved and how vulnerable a company that doesn't focus on cybersecurity is.
4
Anonymous Author
Good overview of the Cyber Security environment, starting with the basic building blocks of the internet and why cyber security matters, followed by some of the methods and control areas needed to implement an effective Cyber Security Program
5
Member's Profile
The Programs and roles chapter is very interesting with accurate data and examples, the instructor is doing amazing job put all the information together in an easy way to understand. I recommend other students take this course.
4
Anonymous Author
I know IT is complicated, and this instructor clearly knows what she is talking about. I had some trouble as a non-IT person staying engaged with all the roles, responsibilities, actions, etc. and differentiating them.
4
Member's Profile
Excellent review of cybersecurity topics - from the history of the internet, to specific types of cyber threats, to company roles in managing cyberthreats. Comprehensive for a first review of this topic.
4
Member's Profile
There is a mistake in review questions (write and wrong answers confused). Other than that, the course is good overview with some interesting details on history and current state of the cyber security
4
Member's Profile
Good summary. I have trouble maintaining IT/technical concepts in my head so having the slides to refer back to when we talk about cybersecurity within my organization will be a real help.
4
Anonymous Author
This course from Lynn Fountain provides a great deal of context related to the evolution of technology ans the responsibilty for appropriate governance. Very insightful and interesting!
5
Member's Profile
Thank you, this course was great. I felt like it covered everything necessary and provided me with the tools to pass the exam at the end. Overall I would recommend this to a colleague.
5
Member's Profile
Lynn did a good job of providing an overview of the cyber security space. Even for someone not familiar with this area, I found this course to be comprehensible and highly informative.
5
Anonymous Author
An interesting overview on cyber security. The presenter was clear as usual and laid out an easy to follow course. I believe it is at a good level for people that are not in IT.
4
Anonymous Author
good overview of information, but as stated before the exam questions rarely match the discussion. Discussion points that are breezed over tend to be the topic of the exam.
5
Member's Profile
Another good course from this instructor. The instructor was clear, and offer detailed information regarding cyber security. Anyone would benefit from this course.
5
Member's Profile
this was a great course that helped better my understanding of cyber security. This should be recommended to all public accountants, especially IT focused ones.
5
Member's Profile
The instructor was clear. I was a bit unsure about the critical infrastructure discussion until the latter portion of the presentation. Interesting information.
5
Anonymous Author
I especially liked the review of the history of the internet. I was born in the 80's and never learned in school who actually invented the internet or the WWW.
4
Anonymous Author
This course provides an understanding of what a cyber security progam is and procedures and levels of security in an effective cyber security program.
4
Member's Profile
Whilst covering things at 10,000 ft the module needs to somehow use more visual aids to bring each of the topics together, which I felt was lacking.
5
Anonymous Author
Really useful view to understand roles, responsibilities and a high level description of elements you'd expect to see in a cyber security program.
5
Member's Profile
Great course on Cyber Security! I highly recommend this course to business professionals looking to get an overview on the cyber security process.
3
Member's Profile
The course give us a brief overview for Cyber security programs, but it doesn't provide examples. Course material is heavy on concepts only.
5
Anonymous Author
This a good course for users to understand security in computer systems. You don't need to be an IT user in order to understand this course.
5
Member's Profile
Very easy to understand bites of information - excellent baseline and I’m excited to take the next course deep dive on NIST framework now.
5
Anonymous Author
This lecture was informative, well planned and easy to follow. This is not my area of expertise, but this helped me to get the overall idea.
5
Anonymous Author
Great course in Cybersecurity related topics and NIST framework. I would recommend this course to an entry level IT Audit/Risk associate.
5
Anonymous Author
The instructor clearly explains the elements involved with cyber security and how they relate to business functions in this course.
5
Member's Profile
A good introduction to cyber security. I would recommend this course to Internal Auditors who intend to conduct IT audit reviews.
5
Member's Profile
I enjoyed learning about Cyber Security although I do not have technical background. Ms. Fountain explained this topic very well.
4
Anonymous Author
Helpful course that speaks to the various levels of cyber security and what makes a cyber security program function properly.
5
Anonymous Author
Good course - a lot of terminology and background information provded in understanding cyber security programs and roles.
5
Member's Profile
Good overview of it security issues. i look forward to learning more about the cyber security certificate to be offered.
5
Anonymous Author
Working for an online retailer, we talk about this all of the time. It is great to get more information on the topic.
5
Anonymous Author
Helpful information for professionals who are not familiar with the concepts and issues related to cyber security.
5
Member's Profile
very informative and contains a lot of great information on cyber threats to an organization and how to mitigate.
4
Member's Profile
The course was well designed and effective in providing the required information relating to Cyber Security.
5
Anonymous Author
Lynn Fountain presents examples and relatable. I enjoyed this class especially the history portion of it.
4
Anonymous Author
Good overview of the concepts. I am not an IT person, but I was able to easily understand the material.
5
Anonymous Author
Excellent introduction to the NIST Cyber Risk Framework. I appreciate the OWASP Top 10 vulnerabilities.
5
Anonymous Author
Good information for a changing world. Helps give insight to the functions and purposes of IT security.
4
Anonymous Author
The material was presented in a very clear manner and included a very informative slide presentation.
4
Anonymous Author
Solid overview of cyber security - good for anyone working in the business world in this day and age.
5
Member's Profile
Lynn explains the topic in a way that makes it easy to understand with concrete examples. Thank you.
5
Anonymous Author
This course was well written and appropraite for the intended audience in length and subject matter.
5
Member's Profile
Good review course. This was a solid refresher for something I have been away from for some time.
4
Member's Profile
Good class on cyber security. Recommended class to anyone who wants to learn more about the topic.
5
Anonymous Author
This course provided a very good foundational introduction to cybersecurity and was easy to follow.
4
Member's Profile
This is an interesting course to learn about cyber security and the history of internet processes.
4
Anonymous Author
Great high view for a non IT oriented person. Highly recommend to a non IT oriented professional.
5
Anonymous Author
Thank you . Learned a lot in this course. I believe I have grew my knowledge
5
Anonymous Author
Well structured and presented course that fully met its presentation and educational objectives.
5
Anonymous Author
This is a great introductory course course on cyber security presented in a very clear manner
4
Anonymous Author
This is a great introductory course course on cyber security presented in a very clear manner
5
Anonymous Author
Informative overview of cyber security, especially for someone who is not in the that field
4
Member's Profile
Very comprehensive course. Easy to understand and suitable even for non-IT professionals
4
Anonymous Author
A good course on cyber security programs, their role in an organization and function.
4
Member's Profile
Great for beginners. The training ease the understanding of technical concepts.
5
Member's Profile
high level review. Was as advertised. Provided good foundation for Cyber Risk.
5
Member's Profile
Good wording, easy to understand, lots of terms to learn, nice sketch of IT.
4
Anonymous Author
Very good Course foe cyber security programs and roles that add value to me.
5
Anonymous Author
Nice course. Material was well laid out and accomplished the stated goals.
4
Member's Profile
Nice overview of Cyber Roles, Responsibilities, and functions. Thank you!
5
Anonymous Author
Very informative on cyber security and the practices to avoid an attack.
5
Member's Profile
It's a very interesting overview course with clear and effective speaker.
5
Anonymous Author
Another great course! Provided a decent introduction to cyber security.
5
Anonymous Author
Course is well done and easy to follow. Topics are timely and current.
4
Anonymous Author
It was good course to understand Cyber Security Programs and Roles.
5
Anonymous Author
Another great course from Lynn, great examples and detailed course.
4
Anonymous Author
Great course, very relevant to businesses of today. Well presented.
5
Anonymous Author
A Primer on Cyber Security Programs and Roles is a good course.
5
Anonymous Author
Very well done. Comprehensive overview and some good examples.
5
Anonymous Author
The course is well designed. The instructor delivered it well.
5
Anonymous Author
Good in-depth information. This course was very informative
4
Member's Profile
Nice survey overview, good examples to real life situations.
5
Member's Profile
Excellent class, great teacher, good examples, great slides.
4
Anonymous Author
Very good course on the topic of cyber security. Thank you.
5
Anonymous Author
Informative and presented in an easy to comprehend manner.
5
Anonymous Author
Good overview, applicable to many different disciplines.
5
Anonymous Author
This course provided a nice overview of cyber security
5
Member's Profile
It is useful to repeat to everyone from time to time
5
Anonymous Author
Great class and easy to follow. Definitely recommend
4
Anonymous Author
she was very informative. thank you for the lesson
5
Anonymous Author
GREAT content and very easy to follow. Thank you!

Prerequisites

Course Complexity: Foundational

No Advanced Preparation or Prerequisites are needed for this course. However, it is recommended to take the other courses in the series prior to completing this one.

Education Provider Information

Company:
Illumeo, Inc., 75 East Santa Clara St., Suite 1215, San Jose, CA 95113
Contact:
For more information regarding this course, including complaint and cancellation policies, please contact our offices at (408) 400- 3993 or send an e-mail to .
Course Syllabus
INTRODUCTION AND OVERVIEW
  5:15Introduction to Cyber Programs and Roles
Cyber Programs and Roles
  10:49History of The Internet
  10:06Cyber Program
  9:14Types of Cyber Security
  12:09OWASP Top 10
  6:44Types of Cyber Threats
  5:05Roles and Actions
  9:56Role Responsibilities
  2:32Focus Areas
  7:13Cyber Risk Programs
  9:18Common Policies
  3:10Procedures and Standards
CONCLUSION
  2:16Summary
CONTINUOUS PLAY
  1:33:42Cyber Programs and Roles
Supporting Materials
  PDFSlides: Cyber Programs and Roles
  PDFCyber Programs and Roles Glossary/Index
REVIEW AND TEST
  quizREVIEW QUESTIONS
 examFINAL EXAM