Cybersecurity Governance and Compliance

Coursera Courses ↗ · Coursera

Open Course on Coursera

Free to audit · Opens on Coursera

Cybersecurity Governance and Compliance

Coursera · Intermediate ·🔐 Cybersecurity ·1mo ago
Build the strategic side of cybersecurity — the one that dictates how organizations remain secure, compliant, and resilient. Cybersecurity Governance and Compliance explains the frameworks that give direction to security decisions, the policies that influence behavior, and the risk practices that keep operations up and running. You’ll learn how to build governance structures, manage security policies, and evaluate risk through identification, analysis, tolerance, appetite, and treatment. BIA and vendor risk management help you understand business-critical dependencies and third-party exposure. You then move into the practical world of compliance: running vendor assessments, using compliance tools, managing privacy and data protection requirements, and strengthening awareness through penetration testing fundamentals, reconnaissance insights, and phishing reporting. If you want to influence security at a strategic level, this course becomes your roadmap. Enroll and advance into a governance-driven cybersecurity role.
Watch on Coursera ↗ (saves to browser)
Sign in to unlock AI tutor explanation · ⚡30

Related AI Lessons

Twitter OSINT & Threat Intelligence: Toolkit for Ethical Hackers & Security Analysts
Use Twitter for OSINT and threat intelligence to enhance security posture ethically and effectively
Medium · Startup
Twitter OSINT & Threat Intelligence: Toolkit for Ethical Hackers & Security Analysts
Learn to leverage Twitter for OSINT and threat intelligence to strengthen security posture
Medium · Cybersecurity
Your Encrypted Laptop Isn’t as Safe as You Think
Encryption alone may not protect your laptop data from theft, understand the limitations and take additional measures
Medium · Cybersecurity
TCP, Firewalls, Port Forwarding & VPNs — How Data Is Sent and Secured
Learn how data is sent and secured over the internet using TCP, firewalls, port forwarding, and VPNs
Medium · Cybersecurity
Up next
A single PR just hijacked the NPM registry...
Fireship
Watch →