Skip to main contentSkip to Xpert Chatbot

IBM: Cybersecurity Compliance and Framework

4.4 stars
34 ratings

This course focuses on cybersecurity principles, industry standards, regulations, and audit processes. It details the fundamental concepts of information security and compliance, covering governance, risk, cybersecurity frameworks, and process management.

Cybersecurity Compliance and Framework
4 weeks
3–4 hours per week
Self-paced
Progress at your own speed
Free
Optional upgrade available

There is one session available:

11,486 already enrolled! After a course session ends, it will be archivedOpens in a new tab.
Starts Nov 22

About this course

Skip About this course

Cyberthreats present a constant challenge today, costing billions and affecting everyone, from governments to small businesses. Are you ready to contribute to the solution?

This course will provide you with a deep understanding of cybersecurity principles, industry standards, regulations, and audit processes. You will explore the fundamental concepts of information security and compliance, covering topics such as governance, risk, compliance, cybersecurity frameworks, and process management.

You will also learn about IT service management and explore the NIST Risk Management Framework and artificial intelligence (AI) ethical considerations. You will gain insights into cybersecurity laws and regulations, focusing on both US and global perspectives, including HIPPA, GDPR, and PCI DSS. Additionally, you will familiarize yourself with the audit processes using the COBIT framework and SOC reports. You will also explore prominent standards such as OWASP, ISO, and IEEE, learning how to apply them effectively.

Throughout this five-module self-paced course, you will engage in interactive activities to apply your knowledge in real-world scenarios. You will also complete a final project to test your skills and showcase your understanding.

Awards

Cybersecurity Compliance and System Administration

At a glance

  • Language: English
  • Video Transcripts: اَلْعَرَبِيَّةُ, Deutsch, English, Español, Français, हिन्दी, Bahasa Indonesia, Português, తెలుగు, Türkçe, 中文
  • Associated skills:Information Privacy, Risk Management Framework, Vulnerability, Endpoint Security, Cyber Security, IT Service Management, Payment Card Industry (PCI) Data Security Standards, Cryptography, System Administration, Encryption, Process Management, Governance, Server Administration, Auditing, Patch Management, Control Objectives For Information And Related Technology (COBIT), Artificial Intelligence, Cybersecurity Compliance, Open Web Application Security Project (OWASP)

What you'll learn

Skip What you'll learn
  • Define fundamental concepts of cybersecurity, including governance, risk management, compliance, AI ethics, and the audit process.
  • Identify cybersecurity laws and regulations, both at a national and international level, and comprehend their implications for organizations.
  • Explore industry standards and their significance in cybersecurity practices and gain insights into the COBIT framework and SOC reports.
  • Apply cybersecurity industry standards and best practices to mitigate risks, enhance security, and ensure compliance through audit processes.

Module 1: Introduction to Information Security and Compliance

  • Module Introduction and Learning Objectives
  • Video: Governance, Risk, and Compliance (GRC)
  • Video: Governance Components
  • Reading: GRC Tools
  • (Lab) Match Activity: Applying GRC Concepts
  • Video: NIST Cybersecurity Framework
  • Reading: Aligning to the NIST Cybersecurity Framework
  • Activity: Align to the NIST Cybersecurity Framework
  • Video: Elements of Effective Security Compliance
  • Video: Standardize Processes
  • Video: Automation and Orchestration
  • Video: Change Management
  • Reading: Asset Management
  • Module 1 Summary: Introduction to Information Security and Compliance
  • Module 1 Glossary: Introduction to Information Security and Compliance
  • Module 1 Graded Quiz: Introduction to Information Security and Compliance
  • Discussion Prompt: (Optional) CSF Implementation

Module 2: Foundations of IT Service Management and Risk Governance

  • Module Introduction and Learning Objectives
  • Video: Information Technology Infrastructure Library (ITIL) Overview
  • Video: Key ITIL Processes
  • Activity: Identify the ITIL Phases
  • Reading: ITIL Process Implementation
  • Video: Risk Management
  • Reading: Risk Analysis
  • (Lab) Matching: Accept, Transfer, Avoid, or Mitigate?
  • Video: Third-Party Risk Assessment and Management
  • Video: AI Ethics
  • Reading: EU AI Act
  • Video: How to Implement AI Ethics
  • Activity: Apply AI Ethics
  • Module 2 Summary: Foundations of IT Service Management and Risk Governance
  • Module 2 Glossary: Foundations of IT Service Management and Risk Governance
  • Module 2 Graded Quiz: Foundations of IT Service Management and Risk Governance
  • Discussion Prompt:(Optional) Foundations of IT Service Management and Risk Governance

Module 3: Understanding Cybersecurity Laws and Regulations

  • Module Introduction and Learning Objectives
  • Video: Overview of US Cybersecurity Laws and Regulations
  • Video: HIPAA Security Rule
  • Reading: HIPAA Cybersecurity Guidance
  • Activity: Apply HIPAA Guidelines
  • Reading: US Laws and Regulations Cheat Sheet
  • Video: Overview of Global Cybersecurity Laws and Regulations
  • Reading: Applying Global Cybersecurity Laws and Regulations
  • Activity: Apply global cybersecurity laws and regulations
  • Reading: Global Cybersecurity Laws and Regulations Cheat Sheet
  • Module 3 Summary: Understanding Cybersecurity Laws and Regulations
  • Module 3 Glossary: Understanding Cybersecurity Laws and Regulations
  • Module 3 Graded Quiz: Understanding Cybersecurity Laws and Regulations
  • Discussion Prompt: (Optional) Cybersecurity Laws

Module 4: Understanding Cybersecurity Standards and Audits

  • Module Introduction and Learning Objectives
  • Video: Industry Standards
  • Reading: OWASP Use Cases
  • Activity: Apply OWASP Standards
  • Video: NIST, ISO, and IEEE Overview
  • Reading: NIST Standards
  • Reading: ISO Standards
  • Reading: IEEE Standards
  • Video: Security Control Audits
  • Video: Performing a Security Audit
  • Video: ISACA Standards
  • Reading: COBIT
  • Video: SOC Reports
  • Module 4 Summary: Understanding Cybersecurity Standards and Audits
  • Module 4 Glossary: Understanding Cybersecurity Standards and Audits
  • Module 4 Graded Quiz: Understanding Cybersecurity Standards and Audits
  • Discussion Prompt: (Optional) Conducting Security Audits
  • Module Introduction and Learning Objectives
  • Final Project Overview
  • Final Project Scenarios
  • Final Project

Module 5: Course summary

  • Congratulations & Next Steps
  • Thanks from the Course Team

This course is part of Cybersecurity Analyst Professional Certificate Program

Learn more 
Expert instruction
8 skill-building courses
Self-paced
Progress at your own speed
9 months
3 - 5 hours per week

Interested in this course for your business or team?

Train your employees in the most in-demand topics, with edX For Business.