Unless your business does everything on paper, you have data — and that data has value. How much risk are you willing to take with it?
Learn how to proactively defend your customers and investments from bad actors with the same security strategies used by Netflix and other top organizations.
Business owners, team leads, and HR professionals play a direct role in keeping data safe. This course will empower you to lead with competence as your organization sets up protection and response plans, hires cybersecurity talent, and builds a security-focused culture.
You'll learn in live, engaging classes alongside a cohort of business professionals with similar goals. This course gives you access to deeper learning through discussion, demos, and office hours with a leader in information security.
Be an informed decision maker in your organization's security policies. You'll learn how to assess the type of threats posed to you and correctly leverage defense and response strategies, threat modeling, and cybersecurity checkups.
Bring everything back to your own organization and security concerns. John won't just outline best practices, he'll teach you how to choose and apply the security concepts relevant for your teams.
Develop a security plan for your organization, with input from Netflix's senior security engineer. You'll learn how to pull together compliance, security tools, and employee culture into a posture of continuous defense.
Modern organizations are one successful hack away from loss of reputation and revenue. In this class, John will outline the vital role of cybersecurity in today's business world and the key concepts you'll refer to throughout the course.
Assignment #01: Research a major cyber incident that occured in the last 5 years and identify how the incident was disruptive.
"Cybersecurity" is a broad term that actually encompasses several types of security. In this lesson, you'll learn which ones are relevant to your business and to what you should pay particular attention.
Assignment #02: Identify the domain you interact with the most and why.
Why are some types of attacks more prevalent in a business environment? John will walk you through some high-profile examples of these attacks and introduce you to a global knowledge base you can use to proactively combat attackers.
Assignment #03: You will receive a case of a real attack on a company. Which Att&ck category do you think it falls under?
Hackers can have many different goals behind an attack. In this class, you'll learn how to identify the "opportunities" for hackers at your company and security concepts that will be most relevant. Then, John will demo some common security tools in class.
Assignment #04: Which concept do you feel is most important to your company and why?
So, your business has been attacked. Now what? Today, you'll learn what to do first if an attack occurs and how to mitigate a worst-case scenario.
Assignment #05: You will receive a case of a real incident. Use the NIST CSF to create a defense and recovery plan for the incident and return to normal operations.
How can you hack your mindset to mitigate security risk? In this lesson, you'll learn how to start thinking with a mindset of threat modeling to successfully identify threat actors and determine a plan for risk reduction.
Assignment #06: Identify some common threats that may affect your company. Brainstorm how you would reduce those risks.
This lesson is about equipping you with the tools and processes needed to make your own cybersecurity checkups. You'll learn how to continually identify weaknesses in systems, remediate them, and harden defenses against attacks.
Assignment #07: Download Nessus Security Scanner and run it against your laptop. What did you find?
Unfortunately, when it comes to regulations, ignorance of the laws won't protect you from the consequences of breaking them. In this class, you'll learn how to apply the most important cybersecurity regulations and compliance requirements.
Assignment #08: You'll receive a real-life example of an incident or event. What regulation was that event connected with? Was the organization's security compliant or non-compliant?
Digital forensics is the most complicated out of all the skills. John will help you understand this opaque area of cybersecurity, with a focus on competence to ask the right questions of DF experts in case of an event.
Assignment #09: Think about digital forensics from the perspective of your company. What questions would you ask of a digital forensics expert?
This lesson is all about how to leverage training and mentorship in your workplace to practice good cyber hygiene. John will share his approach for tailoring the message and motivations to each team and ensuring that no one is unwittingly providing hackers a back door.
Assignment #10: Explore the features and functions of a key security tool. Do you think this would benefit your company? Why or why not?
In this lesson, you'll learn the qualities to look for when hiring cyber talent for your organization. John will walk you through his process for compiling candidate profiles, interviewing, and creating a rewarding work environment for security professionals.
Assignment #11: Assess what skills you feel are most important for your company. Then, go to LinkedIn and find 3 people who you feel are most suitable for that role and explain why.
How does pandemic affect the cybersecurity field? How are threats and best practices evolving alongside changes in how work gets done? John will point to key trends and emerging fields of cybersecurity that are impacting business.
Assignment #12: Using what you've learned in the last 6 weeks, outline a cybersecurity strategy for your company.