Rachit Saini
This business-oriented course focuses on critical controls and procedures for monitoring and minimizing cybersecurity risks. Those that complete the course are familiarized with popular cybersecurity attack vectors and understand how different defence mechanisms can be used to secure and minimize impact on their organization’s infrastructure and resources.
Recipients of this credential are able to:
1. Explain the potential impacts of data breaches to key stakeholders.
2. Identify common cybersecurity threat vectors, and design remediation strategies with appropriate defence controls.
3. Evaluate open-source cybersecurity implementations, and explain how they contribute to cyber resilience.
4. Design and develop a cybersecurity risk management program that incorporates a communications plan for incident response.
Skills / Knowledge
- Cybersecurity
- Risk management
- Risk assessment
- Security controls
- Cyber resilience
- Threat mitigation
- Incident response planning
Issued on
January 16, 2024
Expires on
Does not expire
Job Insights
These are the most common job titles and employers with the most open positions related to this credential.
Showing results for United States.
Top job titles related to this credential
CYBER OPERATIONS SPECIALIST CYBERSECURITY ENGINEER CYBERSECURITY ANALYST
Top Employers
FBI US Navy Reserve EY Cherry Bekaert CDM Smith