Instructor for this course
more

Advancements in technology have raised the level of acknowledgement of threats in the cyber age. These threats touch both the business world and personal lives. Information technology is no longer a “back-office” function.  Once considered a process area that was solely part of the Chief Information Officer’s domain, companies must now acknowledge that whether the threats are internal or external, they are very real and can and will cause harm to many organizations in many ways.  As a result, it is imperative that professionals across the company understand and be prepared to deal with the multitude of ever-growing cyber threats.   

Outside of being aware, organizations must begin to implement cyber risk management programs.This includes strategic risk assessments that evaluate aspects of your organization’s cyber presence. This segment focuses on components and roles for a cyber program. 

Future segments will focus on building a cyber security risk assessment and dissecting the steps of the National Institute of Standards and Technology (NIST) cyber risk framework.

Learning Objectives

  • Identify the elements required of a cyber program.
  • Explore the categories of cyber security.
  • Identify the top 10 vulnerabilities per the Open Web Application Security Project (OWASP).
  • Explore the types/categories of cyber threats.
  • Identify roles in a cyber risk management program.
  • Identify focus areas for cyber programs.
  • Explore basic components of the National Institute of Standards and Technology (NIST) framework.
Last updated/reviewed: November 21, 2019

Included In Certifications

This course is included in the following Certification Programs:

13 CoursesCorporate Cyber Security Certification

  1. Cyber Threat – The Modern-Day Fraud: Breaches and Actions
  2. A Primer on Cyber Security Programs and Roles
  3. Cyber Risk Management Frameworks and Concepts
  4. Cyber Risk Assessment - Identify Critical Assets
  5. Cyber Risk Assessment – Prioritize Assets for Protection
  6. Cyber Risk Assessment - Protect Assets from Threats
  7. Cyber Risk Assessment – Detect Threats Part One
  8. Cyber Risk Assessment – Detect Threats Part Two
  9. Cyber Risk Assessment – Respond to Incidents
  10. Cyber Risk Assessment – Recover from Incidents
  11. Measuring Cyber Risk Utilizing Tiers
  12. Personal Identity Theft
  13. The Business Identity Theft Crisis

36 Reviews (119 ratings)Reviews

5
Anonymous Author
Helpful information for professionals who are not familiar with the concepts and issues related to cyber security.
5
Member's Profile
Great intro course for learning about the basics of cyber security, including defining the function of a Cyber Program. Top risks/threats are identified, as well as the roles of departments within a business and their responsibilities over ensuring proper cyber security. Basic controls are also identified for application.
4
Anonymous Author
Good overview of the Cyber Security environment, starting with the basic building blocks of the internet and why cyber security matters, followed by some of the methods and control areas needed to implement an effective Cyber Security Program
4
Member's Profile
There is a mistake in review questions (write and wrong answers confused). Other than that, the course is good overview with some interesting details on history and current state of the cyber security
4
Member's Profile
Good summary. I have trouble maintaining IT/technical concepts in my head so having the slides to refer back to when we talk about cybersecurity within my organization will be a real help.
4
Anonymous Author
This course from Lynn Fountain provides a great deal of context related to the evolution of technology ans the responsibilty for appropriate governance. Very insightful and interesting!
5
Anonymous Author
An interesting overview on cyber security. The presenter was clear as usual and laid out an easy to follow course. I believe it is at a good level for people that are not in IT.
4
Anonymous Author
good overview of information, but as stated before the exam questions rarely match the discussion. Discussion points that are breezed over tend to be the topic of the exam.
5
Member's Profile
this was a great course that helped better my understanding of cyber security. This should be recommended to all public accountants, especially IT focused ones.
5
Member's Profile
The instructor was clear. I was a bit unsure about the critical infrastructure discussion until the latter portion of the presentation. Interesting information.
4
Member's Profile
Whilst covering things at 10,000 ft the module needs to somehow use more visual aids to bring each of the topics together, which I felt was lacking.
5
Anonymous Author
Really useful view to understand roles, responsibilities and a high level description of elements you'd expect to see in a cyber security program.
5
Member's Profile
Very easy to understand bites of information - excellent baseline and I’m excited to take the next course deep dive on NIST framework now.
5
Anonymous Author
Great course in Cybersecurity related topics and NIST framework. I would recommend this course to an entry level IT Audit/Risk associate.
5
Anonymous Author
The instructor clearly explains the elements involved with cyber security and how they relate to business functions in this course.
5
Member's Profile
A good introduction to cyber security. I would recommend this course to Internal Auditors who intend to conduct IT audit reviews.
4
Anonymous Author
Helpful course that speaks to the various levels of cyber security and what makes a cyber security program function properly.
5
Anonymous Author
Good course - a lot of terminology and background information provded in understanding cyber security programs and roles.
5
Member's Profile
Good overview of it security issues. i look forward to learning more about the cyber security certificate to be offered.
4
Member's Profile
The course was well designed and effective in providing the required information relating to Cyber Security.
5
Anonymous Author
Excellent introduction to the NIST Cyber Risk Framework. I appreciate the OWASP Top 10 vulnerabilities.
4
Anonymous Author
The material was presented in a very clear manner and included a very informative slide presentation.
5
Anonymous Author
This course was well written and appropraite for the intended audience in length and subject matter.
4
Member's Profile
This is an interesting course to learn about cyber security and the history of internet processes.
4
Anonymous Author
Great high view for a non IT oriented person. Highly recommend to a non IT oriented professional.
4
Member's Profile
Very comprehensive course. Easy to understand and suitable even for non-IT professionals
4
Anonymous Author
A good course on cyber security programs, their role in an organization and function.
5
Member's Profile
high level review. Was as advertised. Provided good foundation for Cyber Risk.
5
Anonymous Author
Very informative on cyber security and the practices to avoid an attack.
5
Anonymous Author
Another great course! Provided a decent introduction to cyber security.
4
Anonymous Author
Great course, very relevant to businesses of today. Well presented.
5
Anonymous Author
Good in-depth information. This course was very informative
4
Member's Profile
Nice survey overview, good examples to real life situations.
4
Anonymous Author
Very good course on the topic of cyber security. Thank you.
5
Anonymous Author
Good overview, applicable to many different disciplines.
5
Anonymous Author
This course provided a nice overview of cyber security

Prerequisites

Course Complexity: Foundational

No Advanced Preparation or Prerequisites are needed for this course. However, it is recommended to take the other courses in the series prior to completing this one.

Education Provider Information

Company:
Illumeo, Inc., 75 East Santa Clara St., Suite 1215, San Jose, CA 95113
Contact:
For more information regarding this course, including complaint and cancellation policies, please contact our offices at (408) 400- 3993 or send an e-mail to .
Course Syllabus
INTRODUCTION AND OVERVIEW
  5:15Introduction to Cyber Programs and Roles
Cyber Programs and Roles
  10:49History of The Internet
  10:06Cyber Program
  9:14Types of Cyber Security
  12:09OWASP Top 10
  6:44Types of Cyber Threats
  5:05Roles and Actions
  9:56Role Responsibilities
  2:32Focus Areas
  7:13Cyber Risk Programs
  9:18Common Policies
  3:10Procedures and Standards
CONCLUSION
  2:16Summary
CONTINUOUS PLAY
  1:33:42Cyber Programs and Roles
Supporting Materials
  PDFSlides: Cyber Programs and Roles
  PDFCyber Programs and Roles Glossary/Index
REVIEW AND TEST
  quizREVIEW QUESTIONS
 examFINAL EXAM