Macquarie University
Cyber Security Management and Leadership

Frühbucherrabatt! Schalten Sie 10.000+ Kurse von Google, Microsoft und mehr für £160/Jahr frei. Jetzt sparen.

Diese kurs ist nicht verfügbar in Deutsch (Deutschland)

Wir übersetzen es in weitere Sprachen.
Macquarie University

Cyber Security Management and Leadership

Matt Bushby

Dozent: Matt Bushby

Bei Coursera Plus enthalten

Verschaffen Sie sich einen Einblick in ein Thema und lernen Sie die Grundlagen.
Stufe Anfänger

Empfohlene Erfahrung

Es dauert 11 Stunden
3 Wochen bei 3 Stunden pro Woche
Flexibler Zeitplan
In Ihrem eigenen Lerntempo lernen
Verschaffen Sie sich einen Einblick in ein Thema und lernen Sie die Grundlagen.
Stufe Anfänger

Empfohlene Erfahrung

Es dauert 11 Stunden
3 Wochen bei 3 Stunden pro Woche
Flexibler Zeitplan
In Ihrem eigenen Lerntempo lernen

Was Sie lernen werden

  • Design and Lead a Cybersecurity Strategy.

  • Govern Enterprise-Wide Cyber Risk.

  • Make Informed Executive Decisions During Cyber Incidents.

Kompetenzen, die Sie erwerben

  • Kategorie: Strategic Leadership
  • Kategorie: Culture Transformation
  • Kategorie: Stakeholder Communications
  • Kategorie: Cyber Risk
  • Kategorie: Security Management
  • Kategorie: ISO/IEC 27001
  • Kategorie: Threat Management
  • Kategorie: Cyber Security Strategy
  • Kategorie: NIST 800-53
  • Kategorie: Cyber Governance
  • Kategorie: Leadership
  • Kategorie: Business Risk Management
  • Kategorie: Incident Response
  • Kategorie: Risk Management

Wichtige Details

Zertifikat zur Vorlage

Zu Ihrem LinkedIn-Profil hinzufügen

Kürzlich aktualisiert!

Juni 2025

Bewertungen

5 Aufgaben

Unterrichtet in Englisch

Erfahren Sie, wie Mitarbeiter führender Unternehmen gefragte Kompetenzen erwerben.

 Logos von Petrobras, TATA, Danone, Capgemini, P&G und L'Oreal

In diesem Kurs gibt es 5 Module

Every strong security program begins with a clear strategy. In this foundational topic, learners will explore how to design, articulate, and assess an organisational cybersecurity strategy that aligns with broader business goals and effectively secures critical assets. This topic introduces core security principles, including the CIA Triad—Confidentiality, Integrity, and Availability—as well as the risks, threats, and vulnerabilities shaping today's cyber landscape. Learners will gain an understanding of how to evaluate an organisation's threat environment, determine cyber risk tolerance, and benchmark maturity using internationally recognised frameworks such as NIST, ISO 27001, and CIS Controls. This module also addresses how to embed cybersecurity into enterprise strategy and culture—transforming it from a technical afterthought into a strategic enabler. Whether you're a current or aspiring cyber leader, this topic sets the stage for developing the mindset, language, and vision needed to lead with impact in a fast-evolving threat landscape. By the end of this topic, learners will be able to describe a tailored cybersecurity strategy, evaluate cyber maturity, and begin aligning security decisions with organisational priorities.

Das ist alles enthalten

1 Aufgabe9 Plug-ins

Strong governance is the cornerstone of effective cyber security leadership. In this topic, learners will explore how cyber security must be governed at the highest levels of an organisation—and why executive oversight, structural clarity, and shared accountability are essential in managing cyber risk at scale. This topic introduces learners to key governance models, including the Three Lines of Defence, and examines the responsibilities of senior management in shaping enterprise-wide cyber security programs. It unpacks how leaders must work across risk, compliance, IT, and operational teams to establish robust governance structures, clear reporting lines, and aligned responsibilities. Learners will also explore global governance frameworks such as the NIST Cybersecurity Framework (CSF), NIST SP 800-53, and the CIS Critical Security Controls, building practical familiarity with their categories, control objectives, and assessment tools. These frameworks provide the structure to define, implement, and evaluate cyber programs aligned with business priorities and risk appetite. By the end of this topic, learners will be able to demonstrate how governance frameworks support strategic oversight, guide risk management decisions, and ensure cyber security is embedded as a shared organisational responsibility—from the boardroom to the frontlines.

Das ist alles enthalten

1 Aufgabe14 Plug-ins

Cybersecurity is ultimately about managing risk. In this topic, learners will develop the mindset and methods needed to lead cyber risk management efforts across an organisation—balancing security controls with operational needs and business priorities. Building on governance principles, this topic explores the core concepts of cyber risk, including threat modelling, asset classification, risk tolerance, and the evolving nature of digital threats. Learners will walk through structured risk assessment processes, learning how to identify vulnerabilities, assess likelihood and impact, and prioritise mitigation strategies. Through the lens of the Cyber Risk Process Hierarchy, participants will understand how risk management cascades from board-level policy through to day-to-day operational controls. The topic also reinforces the governance structures introduced in Topic 2, such as the Three Lines of Defence (3LOD) model, demonstrating how leadership, management, and assurance functions work together to reduce exposure. By the end of this topic, learners will be equipped to contribute meaningfully to cyber risk discussions, make informed decisions about risk trade-offs, and embed risk-informed thinking into cyber strategy and security programs.

Das ist alles enthalten

1 Aufgabe8 Plug-ins

In a world of escalating threats and limited resources, effective cybersecurity leadership demands more than intuition—it requires evidence-based decision-making. This topic equips learners with the skills to quantify cyber risks, allowing organisations to prioritise investments and remediation efforts with clarity and confidence. Learners will explore the importance of risk quantification and its role in demonstrating the value of cybersecurity to boards and business leaders. The topic introduces both qualitative and quantitative assessment models, offering a comparison of methods used to calculate risk likelihood, impact, and exposure in financial and operational terms. From risk management concepts to control selection and implementation, learners will evaluate how different frameworks—such as FAIR and NIST—can guide consistent and defensible risk measurement. They will also consider how risk maturity modelling supports continuous improvement and long-term strategy alignment. By the end of this topic, learners will be able to assess organisational risk posture, compare remediation options based on data, and communicate cyber risk in terms that resonate with stakeholders—from executives to regulators.

Das ist alles enthalten

1 Aufgabe10 Plug-ins

In today’s volatile threat landscape, cyber attacks are not a matter of “if”—but “when.” For senior leaders, the true test of cyber resilience lies not just in technical defences, but in how they lead through disruption. This topic arms executive decision-makers with the strategic insights and response frameworks needed to manage cyber crises with confidence. Learners will explore the evolution of cyber attacks, examining real-world case studies and the shifting motivations of attackers—from criminal syndicates to nation-state actors. The topic delves into the cyber kill chain and the anatomy of common attacks, offering practical frameworks for analysis and response. Critically, this topic focuses on the role of senior management in both preparation and response. Learners will examine how leaders make time-critical decisions during incidents, set organisational tone, and coordinate communications with internal and external stakeholders. Through this lens, cyber resilience becomes a leadership responsibility—where risk management, strategic foresight, and trust-building intersect. By the end of the topic, learners will understand the strategic implications of attacks, develop leadership-aligned response strategies, and be ready to build a resilient organisational culture prepared for the next inevitable breach.

Das ist alles enthalten

1 Lektüre1 Aufgabe10 Plug-ins

Erwerben Sie ein Karrierezertifikat.

Fügen Sie dieses Zeugnis Ihrem LinkedIn-Profil, Lebenslauf oder CV hinzu. Teilen Sie sie in Social Media und in Ihrer Leistungsbeurteilung.

Dozent

Matt Bushby
Macquarie University
9 Kurse246 Lernende

von

Warum entscheiden sich Menschen für Coursera für ihre Karriere?

Felipe M.
Lernender seit 2018
„Es ist eine großartige Erfahrung, in meinem eigenen Tempo zu lernen. Ich kann lernen, wenn ich Zeit und Nerven dazu habe.“
Jennifer J.
Lernender seit 2020
„Bei einem spannenden neuen Projekt konnte ich die neuen Kenntnisse und Kompetenzen aus den Kursen direkt bei der Arbeit anwenden.“
Larry W.
Lernender seit 2021
„Wenn mir Kurse zu Themen fehlen, die meine Universität nicht anbietet, ist Coursera mit die beste Alternative.“
Chaitanya A.
„Man lernt nicht nur, um bei der Arbeit besser zu werden. Es geht noch um viel mehr. Bei Coursera kann ich ohne Grenzen lernen.“
Coursera Plus

Neue Karrieremöglichkeiten mit Coursera Plus

Unbegrenzter Zugang zu 10,000+ Weltklasse-Kursen, praktischen Projekten und berufsqualifizierenden Zertifikatsprogrammen - alles in Ihrem Abonnement enthalten

Bringen Sie Ihre Karriere mit einem Online-Abschluss voran.

Erwerben Sie einen Abschluss von erstklassigen Universitäten – 100 % online

Schließen Sie sich mehr als 3.400 Unternehmen in aller Welt an, die sich für Coursera for Business entschieden haben.

Schulen Sie Ihre Mitarbeiter*innen, um sich in der digitalen Wirtschaft zu behaupten.

Häufig gestellte Fragen