Instructor for this course
more

Advancements in technology have raised the level of acknowledgement of threats in the cyber age. These threats touch both the business world and personal lives. Information technology is no longer a “back-office” function.  Once considered a process area that was solely part of the Chief Information Officer’s domain, companies must now acknowledge that whether the threats are internal or external, they are very real and can and will cause harm to many organizations in many ways.  As a result, it is imperative that professionals across the company understand and be prepared to deal with the multitude of ever-growing cyber threats.   

Outside of being aware, organizations must begin to implement cyber risk management programs.This includes strategic risk assessments that evaluate aspects of your organization’s cyber presence. This segment focuses on components and roles for a cyber program. 

Future segments will focus on building a cyber security risk assessment and dissecting the steps of the National Institute of Standards and Technology (NIST) cyber risk framework.

Learning Objectives

  • Identify the elements required of a cyber program.
  • Explore the categories of cyber security.
  • Identify the top 10 vulnerabilities per the Open Web Application Security Project (OWASP).
  • Explore the types/categories of cyber threats.
  • Identify roles in a cyber risk management program.
  • Identify focus areas for cyber programs.
  • Explore basic components of the National Institute of Standards and Technology (NIST) framework.
Last updated/reviewed: November 21, 2019

Included In Certifications

This course is included in the following Certification Programs:

13 CoursesCorporate Cyber Security Certification

  1. Cyber Threat – The Modern-Day Fraud: Breaches and Actions
  2. A Primer on Cyber Security Programs and Roles
  3. Cyber Risk Frameworks And Concepts
  4. Cyber Risk Framework - Identify Assets
  5. Cyber Risk Framework - Prioritize Assets
  6. Cyber Risk Framework - Protect Assets
  7. Cyber Risk Framework - Detect Part One
  8. Cyber Risk Framework - Detect Threats Part Two
  9. Cyber Risk Framework - Respond
  10. Cyber Risk Framework - Recover
  11. Cyber Risk Framework - Utilizing The Tier Approach
  12. Fraud and Personal Identity Theft
  13. Fraud and Business Identity Theft

50 Reviews (180 ratings)Reviews

5
Member's Profile
It is useful to repeat to everyone from time to time
5
Member's Profile
Great intro course for learning about the basics of cyber security, including defining the function of a Cyber Program. Top risks/threats are identified, as well as the roles of departments within a business and their responsibilities over ensuring proper cyber security. Basic controls are also identified for application.
5
Anonymous Author
The course provides a comprehensive overview of cyber security, cyber programs and other related matters. It also provides some methods and controls to apply for cyber security. Recommence the course to those who not in IT field but want to learn more about cyber security.
5
Anonymous Author
This course outlined the importance of developing, implementing, and monitoring a cybersecurity program within a company. It's a good reminder of how quickly our technology has evolved and how vulnerable a company that doesn't focus on cybersecurity is.
4
Anonymous Author
Good overview of the Cyber Security environment, starting with the basic building blocks of the internet and why cyber security matters, followed by some of the methods and control areas needed to implement an effective Cyber Security Program
5
Member's Profile
The Programs and roles chapter is very interesting with accurate data and examples, the instructor is doing amazing job put all the information together in an easy way to understand. I recommend other students take this course.
4
Anonymous Author
I know IT is complicated, and this instructor clearly knows what she is talking about. I had some trouble as a non-IT person staying engaged with all the roles, responsibilities, actions, etc. and differentiating them.
4
Member's Profile
There is a mistake in review questions (write and wrong answers confused). Other than that, the course is good overview with some interesting details on history and current state of the cyber security
4
Member's Profile
Good summary. I have trouble maintaining IT/technical concepts in my head so having the slides to refer back to when we talk about cybersecurity within my organization will be a real help.
4
Anonymous Author
This course from Lynn Fountain provides a great deal of context related to the evolution of technology ans the responsibilty for appropriate governance. Very insightful and interesting!
5
Anonymous Author
An interesting overview on cyber security. The presenter was clear as usual and laid out an easy to follow course. I believe it is at a good level for people that are not in IT.
4
Anonymous Author
good overview of information, but as stated before the exam questions rarely match the discussion. Discussion points that are breezed over tend to be the topic of the exam.
5
Member's Profile
this was a great course that helped better my understanding of cyber security. This should be recommended to all public accountants, especially IT focused ones.
5
Member's Profile
The instructor was clear. I was a bit unsure about the critical infrastructure discussion until the latter portion of the presentation. Interesting information.
5
Anonymous Author
I especially liked the review of the history of the internet. I was born in the 80's and never learned in school who actually invented the internet or the WWW.
4
Member's Profile
Whilst covering things at 10,000 ft the module needs to somehow use more visual aids to bring each of the topics together, which I felt was lacking.
5
Anonymous Author
Really useful view to understand roles, responsibilities and a high level description of elements you'd expect to see in a cyber security program.
3
Member's Profile
The course give us a brief overview for Cyber security programs, but it doesn't provide examples. Course material is heavy on concepts only.
5
Member's Profile
Very easy to understand bites of information - excellent baseline and I’m excited to take the next course deep dive on NIST framework now.
5
Anonymous Author
Great course in Cybersecurity related topics and NIST framework. I would recommend this course to an entry level IT Audit/Risk associate.
5
Anonymous Author
The instructor clearly explains the elements involved with cyber security and how they relate to business functions in this course.
5
Member's Profile
A good introduction to cyber security. I would recommend this course to Internal Auditors who intend to conduct IT audit reviews.
4
Anonymous Author
Helpful course that speaks to the various levels of cyber security and what makes a cyber security program function properly.
5
Anonymous Author
Good course - a lot of terminology and background information provded in understanding cyber security programs and roles.
5
Member's Profile
Good overview of it security issues. i look forward to learning more about the cyber security certificate to be offered.
5
Anonymous Author
Helpful information for professionals who are not familiar with the concepts and issues related to cyber security.
4
Member's Profile
The course was well designed and effective in providing the required information relating to Cyber Security.
5
Anonymous Author
Excellent introduction to the NIST Cyber Risk Framework. I appreciate the OWASP Top 10 vulnerabilities.
5
Anonymous Author
Good information for a changing world. Helps give insight to the functions and purposes of IT security.
4
Anonymous Author
The material was presented in a very clear manner and included a very informative slide presentation.
5
Anonymous Author
This course was well written and appropraite for the intended audience in length and subject matter.
4
Member's Profile
This is an interesting course to learn about cyber security and the history of internet processes.
4
Anonymous Author
Great high view for a non IT oriented person. Highly recommend to a non IT oriented professional.
5
Anonymous Author
Well structured and presented course that fully met its presentation and educational objectives.
4
Member's Profile
Very comprehensive course. Easy to understand and suitable even for non-IT professionals
4
Anonymous Author
A good course on cyber security programs, their role in an organization and function.
4
Member's Profile
Great for beginners. The training ease the understanding of technical concepts.
5
Member's Profile
high level review. Was as advertised. Provided good foundation for Cyber Risk.
5
Member's Profile
Good wording, easy to understand, lots of terms to learn, nice sketch of IT.
5
Anonymous Author
Very informative on cyber security and the practices to avoid an attack.
5
Anonymous Author
Another great course! Provided a decent introduction to cyber security.
4
Anonymous Author
Great course, very relevant to businesses of today. Well presented.
5
Anonymous Author
A Primer on Cyber Security Programs and Roles is a good course.
5
Anonymous Author
Good in-depth information. This course was very informative
4
Member's Profile
Nice survey overview, good examples to real life situations.
4
Anonymous Author
Very good course on the topic of cyber security. Thank you.
5
Anonymous Author
Good overview, applicable to many different disciplines.
5
Anonymous Author
This course provided a nice overview of cyber security
4
Anonymous Author
she was very informative. thank you for the lesson
5
Anonymous Author
GREAT content and very easy to follow. Thank you!

Prerequisites

Course Complexity: Foundational

No Advanced Preparation or Prerequisites are needed for this course. However, it is recommended to take the other courses in the series prior to completing this one.

Education Provider Information

Company:
Illumeo, Inc., 75 East Santa Clara St., Suite 1215, San Jose, CA 95113
Contact:
For more information regarding this course, including complaint and cancellation policies, please contact our offices at (408) 400- 3993 or send an e-mail to .
Course Syllabus
INTRODUCTION AND OVERVIEW
  5:15Introduction to Cyber Programs and Roles
Cyber Programs and Roles
  10:49History of The Internet
  10:06Cyber Program
  9:14Types of Cyber Security
  12:09OWASP Top 10
  6:44Types of Cyber Threats
  5:05Roles and Actions
  9:56Role Responsibilities
  2:32Focus Areas
  7:13Cyber Risk Programs
  9:18Common Policies
  3:10Procedures and Standards
CONCLUSION
  2:16Summary
CONTINUOUS PLAY
  1:33:42Cyber Programs and Roles
Supporting Materials
  PDFSlides: Cyber Programs and Roles
  PDFCyber Programs and Roles Glossary/Index
REVIEW AND TEST
  quizREVIEW QUESTIONS
 examFINAL EXAM