Class Central is learner-supported. When you buy through links on our site, we may earn an affiliate commission.

Coursera

A CISO Guide to Cyber Resilience

Packt via Coursera

Overview

Coursera Flash Sale
40% Off Coursera Plus for 3 Months!
Grab it
In today’s rapidly evolving threat landscape, cyber resilience is no longer a luxury—it’s a necessity. This course empowers Chief Information Security Officers (CISOs) and cybersecurity leaders with the knowledge and strategies needed to design, implement, and maintain robust security programs capable of withstanding and recovering from cyberattacks. Through a structured and practical learning path, you’ll gain actionable insights into ransomware defense, zero-trust implementation, AI-driven threat detection, and incident recovery planning. Each module builds your ability to anticipate threats, respond effectively, and ensure business continuity in complex digital environments. Unlike conventional cybersecurity training, this course bridges strategic leadership with hands-on implementation. It blends real-world case studies, policy development frameworks, and advanced defense methodologies to help CISOs translate strategy into tangible security outcomes. This course is ideal for new and aspiring CISOs, cybersecurity directors, and professionals seeking to strengthen their organization’s security posture. A foundational understanding of cybersecurity concepts is recommended for optimal learning.

Syllabus

  • The Attack on BigCo
    • In this section, we examine ransomware attack vectors, incident response protocols, and network resilience strategies to strengthen organizational cybersecurity defenses.
  • Identity and Access Management
    • In this section, we explore two-factor authentication, NIST 800-63-3B password requirements, and password manager usage to enhance digital security and identity protection.
  • Security Policies
    • In this section, we examine how security policies align with legal requirements, differentiate between policies and procedures, and demonstrate due diligence in risk mitigation.
  • Security and Risk Management
    • This section covers risk identification and impact evaluation to support business security decisions.
  • Securing Your Endpoints
    • In this section, we explore endpoint security strategies, including EDR, NAC, and Zero Trust, to protect remote work environments and test home firewall configurations effectively.
  • Data Safeguarding
    • In this section, we explore offline backups, backup testing, business continuity, and disaster recovery to ensure data availability and operational resilience.
  • Security Awareness Culture
    • In this section, we explore building a security-aware culture through training, engagement, and tracking. Key concepts include shared responsibility, mandatory compliance, and gamification for effective cybersecurity practices.
  • Vulnerability Management
    • In this section, we explore vulnerability prioritization, CVSS scoring, and secure coding practices to reduce organizational risk and enhance security posture.
  • Asset Inventory
    • In this section, we explore asset inventory, change management, and mobile device management (MDM) to enhance network visibility and security through structured processes and effective strategies.
  • Data Protection
    • In this section, we explore encryption for data at rest and in transit, analyze PII definitions, and evaluate third-party vendor risks to implement defense in depth for data protection.
  • Taking Your Endpoint Security to the Next Level
    • In this section, we explore advanced endpoint security strategies, including EDR, MDR, XDR, and zero trust, emphasizing practical implementation and integration over product acquisition.
  • Secure Configuration Baseline
    • In this section, we explore secure configuration baselines by analyzing risk, controls, and budget with real-world strategies.
  • Classify Your Data and Assets
    • In this section, we classify data and assets by impact level, implement asset inventory, and design monitoring and segmentation strategies for enhanced security.
  • Cyber Resilience in the Age of Artificial Intelligence (AI)
    • In this section, we examine strategies to enhance cyber resilience in AI systems, focusing on secure frameworks, bias analysis, and risk evaluation for responsible AI deployment.

Taught by

Packt - Course Instructors

Reviews

Start your review of A CISO Guide to Cyber Resilience

Never Stop Learning.

Get personalized course recommendations, track subjects and courses with reminders, and more.

Someone learning on their laptop while sitting on the floor.