Cybersecurity is no longer just about compliance—it’s about driving measurable business value. This course equips professionals with the knowledge and tools to run cybersecurity governance like a strategic project: on time, on budget, and fully audit-ready. From unifying ISO/IEC and NIST frameworks with regulations such as GDPR, HIPAA, and the EU AI Act, to embedding accountability and measurable impact, you’ll learn how to transform security into a business enabler.


您将学到什么
Evaluate risk landscapes to define ISMS scopes and design control mappings.
Construct cohesive policies, procedures, and documentation using a 16-step governance blueprint.
Measure control effectiveness through KPI dashboards and incident simulations.
Govern iterative policy reviews and continuous improvement cycles to ensure audit readiness.
您将获得的技能
- Cyber Security Strategy
- Performance Measurement
- Risk Management
- NIST 800-53
- Continuous Improvement Process
- Training Programs
- Cybersecurity
- Business Risk Management
- Audit Planning
- Cyber Security Policies
- Regulatory Compliance
- Key Performance Indicators (KPIs)
- ISO/IEC 27001
- Governance Risk Management and Compliance
- General Data Protection Regulation (GDPR)
- Cyber Governance
- Auditing
- Compliance Management
- Governance
- Enterprise Risk Management (ERM)
要了解的详细信息
了解顶级公司的员工如何掌握热门技能

该课程共有6个模块
In this course, you’ll learn how to lead cybersecurity governance as a strategic business initiative that delivers measurable value. You’ll focus on translating regulatory and security standards into actionable policies, unifying frameworks like ISO/IEC, NIST, GDPR, HIPAA, and the EU AI Act into one cohesive program, and embedding accountability through role-based training and simulations. Through expert-led instruction, live risk assessments, and KPI dashboard labs, you’ll gain the skills to design, implement, and operate an audit-ready governance program. By the end, you’ll be equipped to align cybersecurity with business priorities, foster continuous improvement, and drive lasting strategic impact.
涵盖的内容
1个视频1篇阅读材料1个插件
In this foundational module, learners will explore how to break down complex cybersecurity and data privacy mandates into clearly defined policy clauses. Using structured templates and strategic alignment techniques, you’ll convert ISO, NIST, GDPR, and AI governance requirements into actionable policies that reflect your organization’s goals, structure, and responsibilities. This phase establishes the blueprint for scoping your ISMS and securing stakeholder buy-in with business-driven policy alignment.
涵盖的内容
10个视频1篇阅读材料1个作业1次同伴评审1个讨论话题
In this module, learners apply risk-based thinking to customize governance policies and controls based on their organization’s unique environment. By conducting enterprise risk assessments and tailoring ISO/NIST safeguards by business unit, learners will adapt broad frameworks into precise, relevant control implementations. The module emphasizes data protection, AI compliance (GDPR/AI Act), and aligning cloud and privacy standards to operational contexts.
涵盖的内容
10个视频1篇阅读材料1个作业1次同伴评审1个讨论话题
This module focuses on operationalizing governance through documentation and team enablement. Learners will develop and deploy role-based training programs, implement core technical and procedural controls, and embed policy adherence into everyday workflows. Emphasis is placed on engaging stakeholders with interactive learning, policy reinforcement tools, and structured documentation aligned with ISO 27001, NIST SP 800-53, and ISO 22301 standards.
涵盖的内容
10个视频1篇阅读材料1个作业1次同伴评审1个讨论话题
The final module centers on integrating compliance operations into continuous improvement cycles. Learners will consolidate multiple regulatory frameworks into unified control matrices, execute incident simulations, and design KPI dashboards to monitor governance performance. Activities culminate in a governance system that is responsive, audit-ready, and equipped to evolve with changing regulations and business risks.
涵盖的内容
10个视频1篇阅读材料1个作业1次同伴评审1个讨论话题
In this wrap-up module, you’ll consolidate your learning by applying the four-phase governance blueprint to a real-world scenario. Through a capstone policy project and summary guidance, you’ll demonstrate your ability to scope ISMS, tailor controls, design training, and implement KPI-driven improvement cycles. By the end, you’ll showcase the skills to lead audit-ready cybersecurity governance that aligns with business strategy and delivers lasting impact.
涵盖的内容
1个视频1次同伴评审
提供方
从 Security 浏览更多内容
- 状态:免费试用
University of Colorado System
- 状态:免费试用
University of London
- 状态:免费试用
人们为什么选择 Coursera 来帮助自己实现职业发展




常见问题
To access the course materials, assignments and to earn a Certificate, you will need to purchase the Certificate experience when you enroll in a course. You can try a Free Trial instead, or apply for Financial Aid. The course may offer 'Full Course, No Certificate' instead. This option lets you see all course materials, submit required assessments, and get a final grade. This also means that you will not be able to purchase a Certificate experience.
When you purchase a Certificate you get access to all course materials, including graded assignments. Upon completing the course, your electronic Certificate will be added to your Accomplishments page - from there, you can print your Certificate or add it to your LinkedIn profile.
Yes. In select learning programs, you can apply for financial aid or a scholarship if you can’t afford the enrollment fee. If fin aid or scholarship is available for your learning program selection, you’ll find a link to apply on the description page.
更多问题
提供助学金,
¹ 本课程的部分作业采用 AI 评分。对于这些作业,将根据 Coursera 隐私声明使用您的数据。