Building a Cybersecurity Program for your Business
4.2 (25 ratings)
Instead of using a simple lifetime average, Udemy calculates a course's star rating by considering a number of different factors such as the number of ratings, the age of ratings, and the likelihood of fraudulent ratings.
1,103 students enrolled
Wishlisted Wishlist

Please confirm that you want to add Building a Cybersecurity Program for your Business to your Wishlist.

Add to Wishlist

Building a Cybersecurity Program for your Business

Learn how to Protect a Business from being hacked.
4.2 (25 ratings)
Instead of using a simple lifetime average, Udemy calculates a course's star rating by considering a number of different factors such as the number of ratings, the age of ratings, and the likelihood of fraudulent ratings.
1,103 students enrolled
Created by buildthepipe Co.
Last updated 6/2017
English
Current price: $10 Original price: $50 Discount: 80% off
5 hours left at this price!
30-Day Money-Back Guarantee
Includes:
  • 1 hour on-demand video
  • 5 Articles
  • 9 Supplemental Resources
  • Full lifetime access
  • Access on mobile and TV
  • Certificate of Completion
What Will I Learn?
  • Identify the fundamental concepts of Cybersecurity
  • Better understand of the bases of Analysis and Management of Cyber-risks
  • Identify threat, vulnerabilities and impacts
  • Develop detection and mitigation strategies regarding the cyber-risks that affect my business
  • Develop a project to make a Cyber-risks Management Plan available to my Company
  • Build a successful CyberSecurity career
  • Be more than prepared to respond to investors regarding my data protection strategies against cyber-risks
View Curriculum
Requirements
  • No special requirements to be fulfilled, but having some IT and cybersecurity experience would be very useful
Description

~~~Over 6,000 students enrolled in our courses.~~~ (Updated as of August 2017)

~~~PDF Files with templates and included.~~~ 

~~~High quality business presentation voice over.~~~ 

~~~The Cybersecurity Management methodology we teach to Fortune 500 companies.~~~

~~~Cybersecurity Management will be one of the professional areas with most future projection. That’s good news for job seekers with cyber security skills. Employers can’t hire them fast enough. ~~~


According to Juniper research data, the global cost of cybercrime will reach $2 trillion by 2019. During the last few years, the level of computer crimes has exploded:

  • Yahoo hasn’t had a good year. In September, it was revealed that the personal data of half a billion users was stolen in 2014, including names, email addresses, phone numbers, security questions and encrypted passwords”.
  • “Personal information from more than 65 million Tumblr accounts were offered for sale, in a security breach that happened in 2013 but which came to light in 2016”.
  • WikiLeaks says “it will help Silicon Valley defend against CIA hacking”.

Therefore, it is necessary for organizations to have a structured and efficient methodology available to face these cybersecurity challenges. Our Cyber-Risk Management Methodology will master your cybersecurity skills. Throughout this course, we will explain you how to use our methodology to identify cyber-risks as well as define and implement the necessary measures to minimize the impact of their potential materialization.

What are the benefits of this course? It doesn’t matter whether you are the Chief Information Security Officer (CISO) of a multinational company or a Small Medium Business (SMB), the CEO of a start-up, a C Level member of a company or somebody who wants to find a job within the fascinating world of cybersecurity, the benefits of this course for you are clear:

Are you a Corporate CIO or CISO? Organizations face increasing security threats that can destroy or disrupt business. Network attacks, viruses, and even simple mistakes can cause businesses to lose valuable time and money, ultimately impacting their profit, market share, cash flow, competitiveness, profitability, and reputation. Within this context, the CISO’s must have robust methodologies for the analysis and management of cyber-risks which are affecting or could affect their company, with the aim of minimizing the impact of their potential materialization. This course will explain how.

Are you a C Level member of a listed company or an SMB? Industry leaders are finding that cyber-risk management needs to be a responsibility of the C-suite rather than the responsibility of IT. This course will show you in a practical fashion, how to develop a project to make a Cyber-risks Management Plan available to your company. 

Are you working upon a start-up? Any company which handles data sheets with clients’ forms is exposed to cyber-risks. Running a start-up without having a plan for the management of cyber-risks is somewhat suicidal and can cause investors to flee just as soon as losses derived from a gap in cybersecurity materialize. If you take this course, you will be more than prepared to respond to investors regarding your data protection strategies against cyber-risks.

Are you working in or would you like to work in Cyber-risk Management? Security remains the number one spending priority and many companies are expecting to progressively increase security spending. Therefore, in accordance with forecasts carried out by the principal Human Resources companies, cybersecurity will be one of the professional areas with most future projection. That’s good news for job seekers with cyber security skills. Employers can’t hire them fast enough.

Using real life examples, you'll learn how to Identify and prioritize your digital business assets, develop cyber-risk assessment and build an effective action plan to mitigate the identified cyber-risks. As a final training project and based on our methodology, you will be able to create a comprehensive Cyber-risks Management Plan for an existing business of your own. 

You might think to yourself… ”I have no experience in Cybersecurity. How do I drastically increase my value in a short period of time”? You'll learn from our more than ten years of cybersecurity experience while avoiding our pitfalls.

Will you get specific tips for entrepreneurs/start-ups? Yes. You will be given TIPS FOR START-UPS. They are based on our experience as start-up investors and operating partners.

Will you provide us with specific assets? We’re glad you asked! You'll gain exclusive access to our very own spreadsheets (risk assessment and risk management templates). 

Learn the Cyber-risk Management Methodology we teach to Fortune 500 companies. If you follow these lessons and take action, we are confident you'll start managing cyber-risks in an efficient way. This method works for companies from start-ups, SMB’s and publicly traded companies. 

Trust it. It has been designed for organizations who want a strategic approach to cybersecurity.

Who is the target audience?
  • CISO's and Security Managers
  • IT Security Engineers
  • Network Administrators
  • IT Technicians
  • Security Consultants
  • Security Analyst
  • Early Career Security Professionals
  • Entrepreneurs
  • C Level of a listed company or an SMB
  • Anyone wanting to gain knowledge in advanced Cyber-risk management techniques
Compare to Other Cyber Security Courses
Curriculum For This Course
29 Lectures
01:13:53
+
Cyber-risk Management overview
3 Lectures 06:40

Cybersecurity is gaining visibility in the marketplace and has become more important than ever. The increasing need for security becomes clear when looking at security as an enabler of many of the trends in the marketplace. Examples of these trends are:

  • Mobile applications (apps).
  • Social media.
  • Rapid growth of e-commerce.
  • A shift towards a more cloud-computing environment.
  • Increasing importance of information as a critical business asset.
  • Increasing amount of information being published and made available, and so forth.

The aim of this training is to provide you with the necessary tools to enable you to manage all the cyber-risks associated with cybersecurity. At the end of this training, you will be able to develop a CRMP (Cyber-risk Management Plan).

It must be pointed out that no environment is 100% safe. The aim of the CRMP is not to guarantee the existence of such environment, but instead, its intention is to determine the cyber-risk reduction measures necessary to keep the company within an acceptable cyber-risk profile.

On the other hand, it is also important to bear in mind that cybersecurity cannot be guaranteed without integrated planning of all the aspects of the business: strategy, processes, technology and people. 

Preview 03:18

Our Cyber-Risk Management Methodology will master your cybersecurity skills. We will teach you how to identify and implement cyber-risk reduction measures to minimize cyber-risks. 

Preview 03:15

Support materials (pdf files):

  1. Cyber-Risk Quantification Method
  2. Cyber-Risk Quantification Method (Practical Examples)
  3. Cyber Risk Assessment
  4. Cyber Risk Assessment - Practical Exercises
  5. Cyber Risk Management
  6. Cyber Risk Management - Practical Exercises

Hope you like it.

@buildthepipe

IMPORTANT resources to follow the course!
00:07
+
Cyber-risk Quantification Method
3 Lectures 13:09

This section defines the principal variables that intervene in cyber-risk analysis, as well as the metrics and method to be used for final quantification.

  • Threats
  • Vulnerability
  • Severity (Impact)
  • Cyber-risks

The intrinsic cyber-risk profile will be built via the analysis of these variables upon the critical business assets; in other words, the existing cyber-risks per business asset before the application of the reduction measures. 

Preview 05:08

This section defines the principal variables that intervene in cyber-risk analysis, as well as the metrics and method to be used for final quantification.

  • Threats
  • Vulnerability
  • Severity (Impact)
  • Cyber-risks

The intrinsic cyber-risk profile will be built via the analysis of these variables upon the critical business assets; in other words, the existing cyber-risks per business asset before the application of the reduction measures. 

Understanding Severity
02:20

This section defines the principal variables that intervene in cyber-risk analysis, as well as the metrics and method to be used for final quantification.

  • Threats
  • Vulnerability
  • Severity (Impact)
  • Cyber-risks

The intrinsic cyber-risk profile will be built via the analysis of these variables upon the critical business assets; in other words, the existing cyber-risks per business asset before the application of the reduction measures. 

Understanding Cyber-Risks
05:41
+
Cyber-risk Quantification Method - Practical Exercices
1 Lecture 01:19

Carry out tthese exercises before continuing with the training.

Cybersecurity Practical Exercices
01:19
+
Identification of the Protected Domain
1 Lecture 03:41

We can define Business assets as “what needs protecting”. Therefore, these are the targets of all cybersecurity efforts. This identification involves interviewing information owners and recording their perceptions about the different components of cybersecurity: confidentiality, integrity, availability, authentication and the business value of each asset.  

Prioritize and identify critical business assets
03:41
+
Cyber-risk Assessment
4 Lectures 19:34

In this stage of the methodology, an analysis of the intrinsic cyber-risks will be carried out upon the critical business assets identified in the previous stage – protected domain identification -  before the application of cyber-risk reduction measures.

A cyber-risk analysis is carried out for each critical business asset, using the methodology explained in the previous section. The quantification of the intrinsic cyber-risk will determine upon which threats and business assets, the cyber-risk reduction measures should be implemented. 

Cyber-risk Assessment Process
01:54

Example of cyber-risk assessment upon the corporate server of a company, reflecting a technological architecture-type of critical business asset.

Preview 10:47

We can see an example of cyber-risk assessment for the ERP of a company, where the type of critical business asset is the corporate system. 

Example: Corporate System - ERP
05:30

Once the assessment has been completed, we recommend a graphic presentation of the level of cyber-risk per asset. 

Profile of Cyber-risks
01:23
+
Cyber-risk Assessment - Practical Exercises
4 Lectures 08:50

Develop the cyber-risk assessment of your company’s WAN network, considering that it could be affected by some cybersecurity threats. 

Exercise I. Cyber-risk Assessment: WAN Network
01:23

Develop the Cyber-risk Assessment of your company’s e-mail service, considering that it could be affected by some cybersecurity threats.

Preview 02:01

Develop the Cyber-risk Assessment of your company desktop PC, considering that this can be affected by some cybersecurity threats. 

Exercise III. Cyber-risk Assessment: Desktop PC
02:24

Develop the Cyber-risk Assessment of your company’s Data Centre, considering that this could be affected by some physical cybersecurity threats.

Exercise IV. Cyber-risk Assessment: Data Centre
03:02
+
Cyber-risk Management
3 Lectures 06:57

In this section, we will carry out an analysis and evaluation of the effective cyber-risks. In other words, the cyber-risks obtained after the application of cyber-risk reduction measures. 

Cyber-risk Management process
04:05

Example: Technological Architecture – Corporate Server

Preview 01:32

Example: Corporate Application - ERP

Example: Corporate Application - ERP
01:20
+
Cyber Risk Management - Practical Exercises
4 Lectures 05:55

Exercise I. Cyber-risk Management: WAN Network

Preview 01:37

Exercise II. Cyber-risk Management: e-mail

Exercise II. Cyber-risk Management: e-mail
01:26

Exercise III. Cyber-risk Management: Desktop PC

Preview 01:29

Exercise IV. Cyber-risk Management: Data Centre

Exercise IV. Cyber-risk Management: Data Centre
01:23
+
Action Plan
4 Lectures 07:17

The main goal of the CRMP process is to define an overall Action Plan which will allow us to manage the cyber-risks associated to the critical business assets of the company. 

Develop a Cyber-risk Action Plan
03:00

A line of action that is usually contemplated in the Action Plan is the definition and implementation of Cybersecurity Policies, Standards and Procedures.

Cybersecurity Policies, Standards and Procedures
04:13

A key line of action for the Action Plan is communicating to the users the importance of cybersecurity (awareness). 

Example of User Awareness guidelines
00:02

Finally, a key line of action for the Action Plan is to implement cybersecurity software.

Homeland Open Security Technology (HOST) is a project within the Department of Homeland Security, Science and Technology Directorate (DHS S&T). HOST’s focus is on open source security software.

To enable users to easily find cybersecurity related open source software, the HOST program has compiled a catalog. This catalog is meant to be a starting point for evaluating different open source solutions. Due to the wide range of systems and requirements, some of these solutions maybe more appropriate than others. The catalog is simply meant to be a starting point and it is still important to examine whether a solution is appropriate before deploying it. This catalog will be made available through a HOST website, along with an automated method for open source project owners to update information about their software.  The list of software in the catalog is constantly being updated and improved.

Open source Security Software
00:02
+
Bonus Lecture: FREE ebooks and discounts!
2 Lectures 00:39
Get any of our courses at 60% off!
00:33

  • The Fortune 500 Companies B2B Sales Training (miniebook)
  • Business Strategy Formulation: Become a Strategy Consultnat (miniebook) 
  • Digital Strategy Formulation: Become a Strategy Consultnat (miniebook) 
Get our FREE eBooks here – sure to change your life!
00:06
About the Instructor
buildthepipe Co.
4.3 Average rating
267 Reviews
5,687 Students
7 Courses
e-learning that delivers results

We are a group of business & tech advisors with plenty of experience in management positions within publicly traded companies, as well as responsible for the creation and management of start-ups. 

Our mission is to create courses with an eminently practical approach, based on real experiences and directed towards all those interested in reaching unprecedented levels of success

These courses, can be taken either online or delivered face-to-face and they centre upon specific areas of business related to strategy, sales, performance management and digital transformation, among others. 

Enroll in our courses today & let us help you to deliver impressive results!

*********

Somos un grupo de asesores de negocio y tecnológicos con fuerte experiencia en posiciones de gestión dentro de compañías cotizadas, así como en la creación y gestión de start-ups.

Nuestro objetivo es crear cursos con un enfoque eminentemente práctico, basado en experiencias reales y dirigido a todos aquellos que están buscando alcanzar el éxito en el mundo del liderazgo y la gestión empresarial.

Estos cursos se pueden realizar en línea o de forma presencial, y están relacionados con diferentes áreas como: Estrategia, Ventas, Gestión del Rendimiento y Transformación Digital, entre otros.

Empieza hoy con alguno de nuestros cursos y permítemos ayudarte a entregar resultados impresionantes!