Executive Cybersecurity Leadership 101 (901)

$700.00

Executive Cybersecurity Leadership (OG-WRL-007) Responsible for establishing vision and direction for an organization’s cybersecurity operations and resources and their impact on digital and physical spaces. Possesses authority to make and execute decisions that impact an organization broadly, including policy approval and stakeholder engagement.  

Description

Executive Cybersecurity Leadership (OG-WRL-007)

Responsible for establishing vision and direction for an organization’s cybersecurity operations and resources and their impact on digital and physical spaces. Possesses authority to make and execute decisions that impact an organization broadly, including policy approval and stakeholder engagement.

Each component of this course is directly the related to the OPM 901

This course covers all of 45 knowledge statements using recorded sessions with corresponding readings, mindmaps and glossaries. Each session has up to four knowledge confirming quizzes.

It can be done as independent study with continual daily support from a live subject matter expert.

If you choose to do it as a part of a cohort of students: there are weekly scheduled live content Q&A’s.

This is part of a full work role for Executive Cybersecurity Leadership.

Topic of the course:

Operational Planning Processes
Cybersecurity Operation Policies and Procedures
Computer Networking Protocols
Risk Management Processes
Cybersecurity Laws and Regulations
Cybersecurity Policies and Procedures
Privacy Laws and Regulations
Privacy Policies and Procedures
Cybersecurity Principles and Practices
Privacy Principles and Practices
Cybersecurity Threats
Cybersecurity Vulnerabilities
Cybersecurity Threat Characteristics
Common Application Vulnerabilities
Network Infrastructure Principles and Practices
Confidentiality, Integrity and Availability (Cia) Principles and Practices
Non-Repudiation Principles and Practices
Cyber Safety Principles and Practices
New and Emerging Technologies
System Threats
System Vulnerabilities
Network Attack Characteristics
Insider Threat Laws and Regulations
Insider Threat Tools and Techniques
Evidence Admissibility Laws and Regulations
New and Emerging Cybersecurity Risks
Import and Export Control Laws and Regulations
Supply Chain Risks
Federal Agency Roles and Responsibilities
Threat Vector Characteristics
Network Attack Vectors
Critical Infrastructure Systems and Software
Cyber Defense Laws and Regulations
Network Hardware Threats and Vulnerabilities
Computer Networking Principles and Practices
Cyber Operations Principles and Practices
Network Security Principles and Practices
Decision-Making Policies and Procedures
Web Application Security Risks
Cybersecurity Competitions
Organizational Cybersecurity Goals and Objectives
Organizational Cybersecurity Policies and Procedures
Organizational Policies and Procedures
Risk Mitigation Principles and Practices
System Life Cycles

 

Related products