Cyber Governance

Cyber Governance is the practice of establishing guidelines and protocols for effective, secure digital operations within an organization. Coursera's Cyber Governance catalogue teaches you the importance of digital leadership, risk management, and the ethical and legal aspects of data protection. You'll learn about the design and implementation of cyber security strategies, the development of privacy policies, and the assessment of cyber risks. You'll also understand how to foster a culture of cyber resilience within an organization and how to manage incidents and crises in the digital world effectively. Through these lessons, you'll be well-equipped to safeguard your enterprise's cyber infrastructure, ensuring its longevity and integrity.
20credentials
1online degree
52courses

Filter by

Subject
Required

Language
Required

The language used throughout the course, in both instruction and assessments.

Learning Product
Required

Learn from top instructors with graded assignments, videos, and discussion forums.
Get in-depth knowledge of a subject by completing a series of courses and projects.
Earn career credentials from industry leaders that demonstrate your expertise.
Earn your Bachelor’s or Master’s degree online for a fraction of the cost of in-person learning.

Level
Required

Duration
Required

Subtitles
Required

Educator
Required

Results for "cyber governance"

  • Status: New
    Status: Preview

    Skills you'll gain: Responsible AI, LLM Application, Threat Detection, Endpoint Detection and Response, Threat Modeling, Cyber Threat Intelligence, Cyber Threat Hunting, Generative AI Agents, Threat Management, Incident Response, Cyber Governance, Cyber Security Strategy, Data Ethics, Cyber Operations, Risking, Cybersecurity, Large Language Modeling, Cyber Security Assessment, Risk Mitigation, Technology Strategies

  • Status: New
    Status: Free Trial

    Macquarie University

    Skills you'll gain: Responsible AI, Security Controls, Application Security, Cyber Attacks, Cyber Threat Intelligence, Cybersecurity, Data Security, DevSecOps, Security Engineering, Artificial Intelligence, Threat Modeling, Cyber Governance, Artificial Intelligence and Machine Learning (AI/ML), Risk Management, Encryption, Application Programming Interface (API), Machine Learning, Governance, Regulation and Legal Compliance, Applied Machine Learning

  • Status: Free Trial

    Skills you'll gain: Security Controls, Governance, Cybersecurity, Information Assurance, Risk Management Framework, Cyber Security Policies, Cyber Governance, Data Ethics, Cyber Risk, Security Awareness, Data Integrity

  • Status: Free Trial

    Skills you'll gain: Risk Management, Cyber Governance, Cost Benefit Analysis, Security Management, Risk Management Framework, Vulnerability Management, Cyber Attacks, Cybersecurity, Threat Management, Cyber Risk, Operational Risk, Risk Analysis, Enterprise Risk Management (ERM), Business Risk Management, Risk Mitigation, Cyber Threat Intelligence, Vulnerability Assessments, ISO/IEC 27001, Threat Detection, Threat Modeling

  • Status: New
    Status: Free Trial

    Skills you'll gain: Safety Culture, Threat Detection, Cyber Threat Intelligence, Cyber Governance, Cybersecurity, Security Awareness, Responsible AI, Cyber Security Strategy, Threat Management, Leadership, Cyber Risk, Culture Transformation, Cyber Security Policies, Cyber Operations, Cyber Security Assessment, Leadership Development, Cross-Functional Team Leadership, Team Leadership, Team Building, Team Motivation

  • Status: Free Trial

    Skills you'll gain: Cyber Governance, Security Management, Incident Management, Cyber Security Strategy, Business Continuity, Disaster Recovery, Security Controls, Asset Management, Security Requirements Analysis, Risk Management, Resource Management, Compliance Auditing, Performance Metric

  • Status: Free Trial

    University of California, Irvine

    Skills you'll gain: Security Strategy, Cyber Governance, Security Management, Cyber Risk, Compliance Management, Risk Management, Regulatory Compliance, Cyber Security Policies, Cybersecurity, Law, Regulation, and Compliance, Cyber Security Strategy, Governance, NIST 800-53, Security Controls, Procedure Development, Data Governance, Program Standards, Computer Security

  • Status: Free Trial

    Royal Holloway, University of London

    Skills you'll gain: Computer Security Incident Management, Cyber Governance, Incident Management, Incident Response, Security Management, Cyber Security Strategy, Cyber Security Policies, Human Factors (Security), Security Awareness, Cybersecurity, ISO/IEC 27001, Cyber Risk, Security Strategy, Risk Management Framework, Human Factors

  • Status: Preview

    Skills you'll gain: Incident Response, Cyber Risk, Cyber Governance, Cyber Security Strategy, Legal Risk, Enterprise Risk Management (ERM), Business Risk Management, Operational Risk, Mergers & Acquisitions, Cybersecurity, Risk Analysis, Risk Management, Safety Culture, Regulatory Requirements, Compliance Reporting

  • Status: Free Trial

    Skills you'll gain: Cyber Threat Intelligence, Security Management, Internet Of Things, Incident Response, Risk Management, Cyber Security Policies, Cyber Security Strategy, Cyber Governance, Threat Detection, Human Factors (Security), Business Risk Management, Cybersecurity, Security Awareness, Enterprise Risk Management (ERM), Information Management, Computer Security Awareness Training, Mobile Security, Business Ethics, Performance Measurement, Cyber Risk

  • Status: New
    Status: Free Trial

    Skills you'll gain: Human Factors (Security), Security Awareness, Cyber Security Strategy, Cyber Governance, Data Ethics, User Experience Design, Cyber Security Policies, Cyber Security Assessment, Cyber Attacks, Cyber Risk, Security Management, Cybersecurity, Security Strategy, Culture Transformation, Cyber Threat Intelligence, Cyber Threat Hunting, Data Security, Network Security, Cloud Security, Mobile Security

  • Status: Preview

    Skills you'll gain: Threat Modeling, Cyber Governance, Cybersecurity, Cyber Security Policies, Cryptography, Network Security, Cyber Risk, Cyber Attacks, Cyber Security Strategy, Threat Detection, Vulnerability Assessments, Incident Response