This course equips learners with essential knowledge and skills to build and maintain a resilient cybersecurity framework. Cyber resilience is critical in the modern world, where digital systems face evolving threats. The course focuses on understanding how to protect, detect, respond, and recover from cybersecurity incidents.
通过 Coursera Plus 提高技能,仅需 239 美元/年(原价 399 美元)。立即节省

推荐体验
推荐体验
初级
Professionals in cybersecurity, risk management, or business continuity. Basic digital systems knowledge required.
推荐体验
推荐体验
初级
Professionals in cybersecurity, risk management, or business continuity. Basic digital systems knowledge required.
您将学到什么
Understand the evolving cyber threat landscape.
Apply core principles of cybersecurity risk management.
Implement defense-in-depth strategies for system security.
要了解的详细信息

添加到您的领英档案
April 2026
27 项作业
了解顶级公司的员工如何掌握热门技能

该课程共有27个模块
In this section, we examine the dynamic cyber threat landscape, focusing on rapid vulnerability exploitation and the challenges of timely patching for effective risk management.
涵盖的内容
2个视频1篇阅读材料1个作业
2个视频•总计2分钟
- Course Overview•1分钟
- The Cyber Threat Landscape - Overview Video•1分钟
1篇阅读材料•总计10分钟
- The Cyber Threat Landscape - The Reading•10分钟
1个作业•总计10分钟
- Navigating the Cyber Threat Landscape•10分钟
In this section, we examine legal and contractual requirements shaping security practices. Key concepts include data privacy laws, critical infrastructure standards, and contractual obligations for compliance and accountability.
涵盖的内容
1个视频1篇阅读材料1个作业
1个视频•总计1分钟
- Legal and Contractual Requirements - Overview Video•1分钟
1篇阅读材料•总计10分钟
- Legal and Contractual Requirements - The Reading•10分钟
1个作业•总计10分钟
- Legal and Contractual Requirements in Data Protection•10分钟
In this section, we define key security terminology, distinguish between security events and incidents, and apply defence in depth principles to enhance threat management practices.
涵盖的内容
1个视频2篇阅读材料1个作业
1个视频•总计1分钟
- Key Terms and Concepts - Overview Video•1分钟
2篇阅读材料•总计20分钟
- Introduction•10分钟
- Defence in Depth•10分钟
1个作业•总计10分钟
- Foundations of Cybersecurity and Information Protection•10分钟
In this section, we explore security trade-offs and how to make balanced decisions for effective protection.
涵盖的内容
1个视频2篇阅读材料1个作业
1个视频•总计1分钟
- Managing the Risks - Overview Video•1分钟
2篇阅读材料•总计20分钟
- Introduction•10分钟
- Risk Appetite•10分钟
1个作业•总计10分钟
- Risk Management Fundamentals•10分钟
In this section, we examine the three security pillars-people, processes, and technology-and their interdependence in mitigating risks through training, policies, and practical implementation.
涵盖的内容
1个视频1篇阅读材料1个作业
1个视频•总计1分钟
- Three Security Pillars - Overview Video•1分钟
1篇阅读材料•总计5分钟
- Three Security Pillars - The Reading•5分钟
1个作业•总计10分钟
- Security Fundamentals and Human Behavior•10分钟
In this section, we explore defence in depth, focusing on prevention, detection, and response to enhance cyber resilience and manage threats effectively.
涵盖的内容
1个视频2篇阅读材料1个作业
1个视频•总计1分钟
- Layers of Defence in Depth - Overview Video•1分钟
2篇阅读材料•总计20分钟
- Introduction•10分钟
- Response•10分钟
1个作业•总计10分钟
- Layers of Defence in Depth•10分钟
In this section, we map reference controls to defence-in-depth layers, emphasizing risk-based selection and multi-layered security implementation for practical cyber resilience.
涵盖的内容
1个视频1篇阅读材料1个作业
1个视频•总计1分钟
- Mapping the Layers Against the Part 2 Reference Controls - Overview Video•1分钟
1篇阅读材料•总计10分钟
- Mapping the Layers Against the Part 2 Reference Controls - The Reading•10分钟
1个作业•总计10分钟
- Layered Security Control Implementation•10分钟
In this section, we explore practical steps for aligning security frameworks with organisational needs, defining clear objectives, and conducting gap analyses to identify weaknesses.
涵盖的内容
1个视频1篇阅读材料1个作业
1个视频•总计1分钟
- Implementation Tips - Overview Video•1分钟
1篇阅读材料•总计10分钟
- Implementation Tips - The Reading•10分钟
1个作业•总计10分钟
- Security Implementation Fundamentals•10分钟
In this section, we explore asset management, focusing on identifying information assets, maintaining accurate inventories, and optimising usage for security and cost efficiency.
涵盖的内容
1个视频1篇阅读材料1个作业
1个视频•总计1分钟
- Asset Management - Overview Video•1分钟
1篇阅读材料•总计10分钟
- Asset Management - The Reading•10分钟
1个作业•总计10分钟
- Asset Management Fundamentals•10分钟
In this section, we examine how board-level commitment influences cybersecurity success. Key concepts include executive support, strategic alignment, and leadership impact on security outcomes.
涵盖的内容
1个视频1篇阅读材料1个作业
1个视频•总计1分钟
- Board-Level Commitment and Involvement - Overview Video•1分钟
1篇阅读材料•总计10分钟
- Board-Level Commitment and Involvement - The Reading•10分钟
1个作业•总计10分钟
- Board-Level Cybersecurity Leadership•10分钟
In this section, we explore business continuity management, focusing on risk mitigation, plan development, and disruption response to ensure organizational resilience and operational continuity.
涵盖的内容
1个视频1篇阅读材料1个作业
1个视频•总计1分钟
- Business Continuity Management - Overview Video•1分钟
1篇阅读材料•总计10分钟
- Business Continuity Management - The Reading•10分钟
1个作业•总计10分钟
- Business Continuity Management Fundamentals•10分钟
In this section, we explore configuration hardening and patch management to reduce security risks. Key concepts include disabling unnecessary functions, applying updates, and minimizing attack surfaces.
涵盖的内容
1个视频1篇阅读材料1个作业
1个视频•总计1分钟
- Configuration and Patch Management - Overview Video•1分钟
1篇阅读材料•总计10分钟
- Configuration and Patch Management - The Reading•10分钟
1个作业•总计10分钟
- Configuration and Patch Management Fundamentals•10分钟
In this section, we explore continual improvement processes to adapt security measures to evolving threats. Key concepts include threat analysis, risk mitigation, and maintaining security maturity through regular adjustments.
涵盖的内容
1个视频1篇阅读材料1个作业
1个视频•总计1分钟
- Continual Improvement Process - Overview Video•1分钟
1篇阅读材料•总计10分钟
- Continual Improvement Process - The Reading•10分钟
1个作业•总计10分钟
- Continuous Process Enhancement and Evaluation•10分钟
In this section, we explore encryption techniques for securing data at rest and in transit, evaluate encryption alternatives, and emphasize secure key management practices for real-world data protection.
涵盖的内容
1个视频1篇阅读材料1个作业
1个视频•总计1分钟
- Encryption - Overview Video•1分钟
1篇阅读材料•总计10分钟
- Encryption - The Reading•10分钟
1个作业•总计10分钟
- Encryption and Data Protection Fundamentals•10分钟
In this section, we examine external certification benefits, including trust building, compliance, and business growth, while exploring frameworks like Cyber Essentials and ISO 27001 for structured security strategies.
涵盖的内容
1个视频1篇阅读材料1个作业
1个视频•总计1分钟
- External Certification/Validation - Overview Video•1分钟
1篇阅读材料•总计10分钟
- External Certification/Validation - The Reading•10分钟
1个作业•总计10分钟
- External Certification and Validation in Cybersecurity•10分钟
In this section, we examine IAAA controls, the need to know principle, and least privilege to manage user access and reduce security risks in organisations.
涵盖的内容
1个视频1篇阅读材料1个作业
1个视频•总计1分钟
- Identity and Access Control - Overview Video•1分钟
1篇阅读材料•总计10分钟
- Identity and Access Control - The Reading•10分钟
1个作业•总计10分钟
- Identity and Access Control Fundamentals•10分钟
In this section, we examine incident response management, emphasizing prepared plans, detection measures, and defense-in-depth strategies to minimize breach impacts.
涵盖的内容
1个视频1篇阅读材料1个作业
1个视频•总计1分钟
- Incident Response Management - Overview Video•1分钟
1篇阅读材料•总计10分钟
- Incident Response Management - The Reading•10分钟
1个作业•总计10分钟
- Incident Response Fundamentals•10分钟
In this section, we examine internal audits as tools for verifying security measures against standards, identifying weaknesses, and supporting continual improvement through objective evaluation.
涵盖的内容
1个视频1篇阅读材料1个作业
1个视频•总计1分钟
- Internal Audits - Overview Video•1分钟
1篇阅读材料•总计10分钟
- Internal Audits - The Reading•10分钟
1个作业•总计10分钟
- Internal Audit Fundamentals•10分钟
In this section, we examine malware protection strategies, including anti-malware software, firewalls, data scanning, and staff training to reduce infection risks through technical and human measures.
涵盖的内容
1个视频1篇阅读材料1个作业
1个视频•总计1分钟
- Malware Protection - Overview Video•1分钟
1篇阅读材料•总计10分钟
- Malware Protection - The Reading•10分钟
1个作业•总计10分钟
- Malware Protection Fundamentals•10分钟
In this section, we explore network asset identification, security zone organization, and implementation of firewalls and DMZs to enhance network protection and data security.
涵盖的内容
1个视频1篇阅读材料1个作业
1个视频•总计1分钟
- Network and Communications Security - Overview Video•1分钟
1篇阅读材料•总计10分钟
- Network and Communications Security - The Reading•10分钟
1个作业•总计10分钟
- Network Security Fundamentals•10分钟
In this section, we examine physical and environmental security measures, emphasizing secure perimeters, hardware protection, and environmental risk analysis to enhance overall system integrity.
涵盖的内容
1个视频1篇阅读材料1个作业
1个视频•总计1分钟
- Physical and Environmental Security - Overview Video•1分钟
1篇阅读材料•总计10分钟
- Physical and Environmental Security - The Reading•10分钟
1个作业•总计10分钟
- Physical and Environmental Security Fundamentals•10分钟
In this section, we explore continuous security monitoring, log generation, and analysis for detecting threats and supporting incident response. Key concepts include real-time observation, log management, and forensic readiness.
涵盖的内容
1个视频1篇阅读材料1个作业
1个视频•总计1分钟
- Security Monitoring - Overview Video•1分钟
1篇阅读材料•总计10分钟
- Security Monitoring - The Reading•10分钟
1个作业•总计10分钟
- Security Monitoring Fundamentals•10分钟
In this section, we examine how documented security policies and procedures ensure organisational compliance, consistency, and accountability, while highlighting the importance of continuous policy review and alignment with evolving requirements.
涵盖的内容
1个视频1篇阅读材料1个作业
1个视频•总计1分钟
- Security Policies - Overview Video•1分钟
1篇阅读材料•总计10分钟
- Security Policies - The Reading•10分钟
1个作业•总计10分钟
- Security Policy Fundamentals•10分钟
In this section, we explore tailored security training for dedicated roles and general staff, emphasizing effective risk management through role-specific programs and awareness strategies.
涵盖的内容
1个视频1篇阅读材料1个作业
1个视频•总计1分钟
- Staff Training and Awareness - Overview Video•1分钟
1篇阅读材料•总计10分钟
- Staff Training and Awareness - The Reading•10分钟
1个作业•总计10分钟
- Staff Training and Awareness in Security•10分钟
In this section, we examine supply chain security, emphasizing due diligence, SLA reviews, and risk assessments to mitigate third-party vulnerabilities.
涵盖的内容
1个视频1篇阅读材料1个作业
1个视频•总计1分钟
- Supply Chain Security - Overview Video•1分钟
1篇阅读材料•总计10分钟
- Supply Chain Security - The Reading•10分钟
1个作业•总计10分钟
- Supply Chain Security and Contractual Responsibilities•10分钟
In this section, we examine system risks based on access types, implement input sanitisation for web services, and design security measures for system interactions.
涵盖的内容
1个视频1篇阅读材料1个作业
1个视频•总计1分钟
- System Security - Overview Video•1分钟
1篇阅读材料•总计10分钟
- System Security - The Reading•10分钟
1个作业•总计10分钟
- System Security Fundamentals•10分钟
In this section, we explore vulnerability scanning and penetration testing to identify system weaknesses. Key concepts include using tools, analyzing results, and integrating security testing into programs.
涵盖的内容
1个视频1篇阅读材料1个作业
1个视频•总计1分钟
- Vulnerability Scanning and Penetration Testing - Overview Video•1分钟
1篇阅读材料•总计10分钟
- Vulnerability Scanning and Penetration Testing - The Reading•10分钟
1个作业•总计10分钟
- Security Testing Fundamentals•10分钟
位教师

提供方

提供方

Packt helps tech professionals put software to work by distilling and sharing the working knowledge of their peers. Packt is an established global technical learning content provider, founded in Birmingham, UK, with over twenty years of experience delivering premium, rich content from groundbreaking authors on a wide range of emerging and popular technologies.
人们为什么选择 Coursera 来帮助自己实现职业发展

Felipe M.

Jennifer J.

Larry W.

Chaitanya A.
常见问题
Yes, you can preview the first video and view the syllabus before you enroll. You must purchase the course to access content not included in the preview.
If you decide to enroll in the course before the session start date, you will have access to all of the lecture videos and readings for the course. You’ll be able to submit assignments once the session starts.
Once you enroll and your session begins, you will have access to all videos and other resources, including reading items and the course discussion forum. You’ll be able to view and submit practice assessments, and complete required graded assignments to earn a grade and a Course Certificate.
If you complete the course successfully, your electronic Course Certificate will be added to your Accomplishments page - from there, you can print your Course Certificate or add it to your LinkedIn profile.
This course is currently available only to learners who have paid or received financial aid, when available.
Yes. In select learning programs, you can apply for financial aid or a scholarship if you can’t afford the enrollment fee. If fin aid or scholarship is available for your learning program selection, you’ll find a link to apply on the description page.
更多问题
提供助学金,

