Class Central is learner-supported. When you buy through links on our site, we may earn an affiliate commission.

Coursera

Cybersecurity Governance: 16 Steps with NIST & ISO

Starweaver via Coursera

Overview

Coursera Flash Sale
40% Off Coursera Plus for 3 Months!
Grab it
Unify your cybersecurity standards into a resilient, audit-ready governance program. In today’s complex risk environment, even a single supply chain breach can lead to severe regulatory penalties and reputational harm. This course provides a repeatable, risk-based approach to integrating ISO 27001, ISO 27002, ISO 27701, and the NIST Cybersecurity Framework—ideal for compliance leaders preparing for certification or strengthening their information security posture. Through a structured 16-step blueprint and hands-on demonstrations, you’ll learn to scope your ISMS, conduct risk assessments, map controls, and align cloud and privacy safeguards. You’ll apply ISO and NIST standards to real-world scenarios, using templates, checklists, and workflows to streamline documentation and incident response. By course end, you'll be equipped to build and maintain a governance framework that meets global cybersecurity standards and scales with organizational risk.

Syllabus

  • Course Introduction
    • In this course, you’ll learn how to integrate ISO 27001/27002/27701 with the NIST Cybersecurity Framework through a structured, 16-step blueprint. You’ll focus on translating global standards into actionable governance practices, from scoping and risk assessment to control mapping, cloud and privacy safeguards, and continuous improvement. Through concise expert-led videos, hands-on templates, and workflow demonstrations, you’ll gain the skills to design and operate a repeatable, audit-ready governance program. By the end, you’ll be equipped to unify fragmented processes, strengthen risk-driven decision-making, and deploy a resilient framework that adapts to evolving threats and regulatory demands.
  • Governance Planning & Scoping
    • In this module, you’ll explore how to establish the foundation for a resilient cybersecurity governance program. You’ll examine how to define the purpose, scope, and context of an Information Security Management System (ISMS) aligned with ISO 27001 and the NIST Cybersecurity Framework. You’ll learn how to engage leadership, align stakeholders, and set clear roles and responsibilities through governance tools and RACI matrices. Finally, you’ll apply strategies for developing success criteria, mapping strategic goals, and scoping processes to ensure accurate, audit-ready implementation.
  • Risk Assessment & Control Tailoring
    • In this module, you’ll explore how to conduct risk-driven governance by applying structured frameworks for assessment and control alignment. You’ll examine ISO 27005 and NIST SP 800-30 methods to identify, analyze, and prioritize risks, while setting acceptance thresholds that reflect business goals and compliance drivers. You’ll also learn to tailor ISO Annex A and NIST CSF controls to organizational risk profiles, justify selections for audit readiness, and integrate cloud and privacy safeguards from ISO 27017, ISO 27701, and the NIST Privacy Framework. Finally, you’ll apply documentation strategies and practical tools to deliver audit-ready risk registers, control mappings, and privacy addenda that strengthen governance and resilience.
  • Governance Implementation
    • In this module, you’ll explore how to operationalize cybersecurity governance through continuity planning, technical safeguards, and workforce awareness programs. You’ll examine ISO 22301 and NIST CSF recovery practices to build resilience against disruptions, while applying ISO 27017 and NIST SP 800-53 to deploy cloud and technical controls. You’ll also design staff training initiatives that foster a security-aware culture and implement ISO 30111 and NIST SP 800-40 methods for vulnerability and patch management. By the end, you’ll have the tools to enforce governance effectively, minimize downtime, and ensure ongoing compliance.
  • Monitoring, Auditing & Continuous Improvement
    • In this module, you’ll explore how to strengthen governance through proactive monitoring, incident response, and continuous optimization. You’ll examine ISO 27035 and NIST SP 800-61 playbooks to design incident-response plans, define roles, and conduct readiness drills. You’ll establish measurable KPIs and tier-based metrics with ISO 27004 and NIST frameworks to ensure audit readiness and build compliance dashboards. Finally, you’ll apply automation and AI-driven workflows to streamline monitoring, reuse templates, and embed feedback loops that drive ongoing improvement and scalability of your ISMS.
  • Course Conclusion
    • In this wrap-up module, you’ll consolidate your learning by applying governance planning, risk assessment, implementation, and monitoring skills in a multi-layered breach simulation. By the end, you’ll showcase the skills to lead resilient cybersecurity programs that adapt to threats, meet compliance demands, and strengthen organizational trust.

Taught by

Paweł Mielniczek and Starweaver

Reviews

Start your review of Cybersecurity Governance: 16 Steps with NIST & ISO

Never Stop Learning.

Get personalized course recommendations, track subjects and courses with reminders, and more.

Someone learning on their laptop while sitting on the floor.