Road to the CISO – Culminating Project Course

Instructor: Herbert J. Mattord, Ph.D., CISM, CISSP, CDP , Michael Whitman, Ph.D., CISM, CISSP

Intermediate Level • 2 weeks to complete at 10 hours a week • Flexible Schedule

What You'll Learn

  • Identify the career development and path of a Cybersecurity professional from entry-level to CISO
  • Define and describe the role and function of a CISO in planning for cybersecurity
  • Identify the development of a cybersecurity governance program and the role the CISO would play in it
  • Discuss the strategic responsibilities of the CISO in overseeing an organization’s cybersecurity program

Skills You'll Gain

Enterprise Risk Management (ERM)
Cyber Risk
Cyber Security Strategy
Organizational Leadership
Information Technology
Security Management
Contingency Planning
Governance
Business Risk Management
Risk Management
Staff Management
Cyber Security Policies
Cyber Governance
Organizational Structure
Cybersecurity
IT Management

Shareable Certificate

Earn a shareable certificate to add to your LinkedIn profile

Outcomes

  • Learn new concepts from industry experts
  • Gain a foundational understanding of a subject or tool
  • Develop job-relevant skills with hands-on projects
  • Earn a shareable career certificate

There are 6 modules in this course

Learning objectives for the capstone project.

Prepare and submit a case-based presentation to deliver the results of a proposal to improve the staffing of the case organization's cybersecurity team.

Prepare and submit a case-based presentation that delivers the results of your proposal to establish a risk management program.

Prepare and submit a case-based presentation to deliver the results of a proposal to improve the cybersecurity policy portfolio of the organization.

In this module, you will prepare and submit your case-based presentations to deliver the results of your proposal to establish a contingency planning program.

Prepare and submit a case-based presentation that delivers the results of your proposal to establish a Cybersecurity Governance program.