Business and Economics
Learn to leverage the capabilities of cybersecurity best practices to protect your organization and unlock next-level results.
The course Cybersecurity for Business Leaders on Udacity covers a range of topics to help business leaders navigate the challenges of cybersecurity. It begins by defining cybersecurity and explaining the differences between threats, attacks, and breaches. The course then delves into addressing top business threats and conducting tabletop exercises. Participants will also learn about the legal ramifications of breaches and how to apply compliance as a layer of defense. They will explore resources from standards organizations and utilize network detection and response solutions to develop an Incident Response Plan. The course also focuses on creating a cybersecurity culture within the organization, including increasing employee buy-in, implementing training and awareness programs, and aligning cybersecurity expectations with third parties. Participants will learn how to prioritize budget items for cybersecurity initiatives, interpret risk and return on investment, and find and retain talent for enterprise risk management. The course culminates in a project where participants will research and identify critical cyber threats and risks specific to their industry, create an Enterprise Risk Management plan, develop an Incident Response Plan, and create a three-year cybersecurity budget. Finally, participants will describe their organizational-wide cybersecurity awareness campaign.
by Udacity
Learn to leverage the capabilities of cybersecurity best practices to protect your organization and...
by Udacity
Get your start in the high growth field of cybersecurity by building foundational skills including e...
by Udacity
Learners leave the course with a reinvigorated perspective on cybersecurity and a lexicon of practic...
by Udacity
This course provides an introduction to security issues relating to cyber-physical systems including...
by Udacity
Learn how to find and exploit vulnerabilities, design and execute penetration testing plans, and rep...