Study any time, from any device.

Learn Cybersecurity Management

The Cybersecurity Management skill path teaches you governance and risk management related to cybersecurity. You'll learn about developing and managing a security program, enterprise security operations, incident management, compliance and more.

30 courses  //   140 videos  //   13 hours of training

Cybersecurity Management training

This learning path takes a deep dive into cybersecurity management. As you progress through 30 courses, you’ll gain a comprehensive understanding of managing a security program, including implementing security policies and procedures, performing vulnerability and risk assessments, planning for business continuity and disaster recovery, and using a variety of technical tools and controls for asset security, access control, threat detection and more. Upon completion, you’ll have a broad range of knowledge related to managing a cybersecurity program that you can carry over to your next job role or project.

Learning path components

Security & Privacy Policies and Procedures
Course
Security & Privacy Policies and Procedures

Security & Privacy Policies and Procedures

This course helps you refresh your knowledge of security and privacy policies and procedures.

2 videos
24 minutes of training

IR, BC and DR Planning and Procedures
Course
IR, BC and DR Planning and Procedures

IR, BC and DR Planning and Procedures

The fundamentals of incident response, business continuity and disaster recovery are explored in six videos.

6 videos
28 minutes of training

Effective Incident Management
Course
Effective Incident Management

Effective Incident Management

Review effective incident management with eight videos on metrics, response procedures and more.

8 videos
26 minutes of training

Controls, Metrics and Monitoring
Course
Controls, Metrics and Monitoring

Controls, Metrics and Monitoring

Take a closer look at what tools you have with this course on controls, metrics and monitoring for security managers.

3 videos
17 minutes of training

Security Program Activities
Course
Security Program Activities

Security Program Activities

Explore security program activities with two videos on business case development, program development, documentation and more.

2 videos
20 minutes of training

Incident Response and Recovery Procedures
Course
Incident Response and Recovery Procedures

Incident Response and Recovery Procedures

Prepare for possible trouble with this course on incident response and recovery procedures, including designing systems to facilitate incident response.

2 videos
17 minutes of training

Securing Communications and Collaboration Solutions
Course
Securing Communications and Collaboration Solutions

Securing Communications and Collaboration Solutions

Secure your communications and collaboration solutions with this course covering BYOD, mobile device management and more.

1 video
15 minutes of training

Security Program Architecture
Course
Security Program Architecture

Security Program Architecture

Information security program architecture is reviewed and dissected in ten videos. Controls, objectives, program elements and more provide a strong foundation for an aspiring security manager.

10 videos
22 minutes of training

Vulnerability Assessment Methods and Tools
Course
Vulnerability Assessment Methods and Tools

Vulnerability Assessment Methods and Tools

This course helps you broaden your understanding of vulnerability assessment and tools, including tool lists and test types.

2 videos
21 minutes of training

Monitoring and Communication
Course
Monitoring and Communication

Monitoring and Communication

Enhance your risk management skills with three videos on risk monitoring and communication.

3 videos
7 minutes of training

Software Vulnerabilities and Security Controls
Course
Software Vulnerabilities and Security Controls

Software Vulnerabilities and Security Controls

In this course, we take you through the fundamentals of software vulnerabilities and security controls.

4 videos
37 minutes of training

Asset Classification and Operational Considerations
Course
Asset Classification and Operational Considerations

Asset Classification and Operational Considerations

Review asset classification and operational considerations in five videos, covering vocabulary, diagrams, key terms and important takeaways.

5 videos
10 minutes of training

Risk Assessment
Course
Risk Assessment

Risk Assessment

Two videos take you through risk assessment methodologies, vocabulary and examples.

2 videos
17 minutes of training

Risk Metric Scenarios
Course
Risk Metric Scenarios

Risk Metric Scenarios

This course on risk metric scenarios covers analyzing scenarios to secure enterprises and reviewing existing security.

2 videos
13 minutes of training

Risk Mitigation Strategies and Controls
Course
Risk Mitigation Strategies and Controls

Risk Mitigation Strategies and Controls

Dive into risk mitigation strategies and controls with this course on risk scenarios, responses and more.

4 videos
27 minutes of training

Business Continuity Planning
Course
Business Continuity Planning

Business Continuity Planning

Review business continuity planning and the challenges of disaster recovery with two videos on business impact analysis, auditing business continuity and more.

2 videos
40 minutes of training

Business and Industry Influences and Risks
Course
Business and Industry Influences and Risks

Business and Industry Influences and Risks

Brush up on your knowledge of business and industry influences and risks with this course on enterprise risk management (ERM) and business models.

2 videos
16 minutes of training

Strategy and Implementation
Course
Strategy and Implementation

Strategy and Implementation

Take a fresh look at risk management strategy and implementation. Includes vocabulary, phases and tips for effective information risk management.

5 videos
17 minutes of training

Implementation Action Plan
Course
Implementation Action Plan

Implementation Action Plan

Two videos help you review action plan types, action plan implementation strategies and information security program objectives.

2 videos
12 minutes of training

IS Resources and Constraints
Course
IS Resources and Constraints

IS Resources and Constraints

Information security resources and constraints are examined in this two-video course covering personnel, organizational structure and more.

2 videos
13 minutes of training

Information Security Strategy
Course
Information Security Strategy

Information Security Strategy

Five videos take you through the core tenets of information security strategy, including strategy elements and metrics.

5 videos
21 minutes of training

IS Roles and Responsibilities
Course
IS Roles and Responsibilities

IS Roles and Responsibilities

Refresh your knowledge of information security roles and responsibilities with three videos on key roles and responsibilities, risk management and associated topics.

3 videos
6 minutes of training

Introduction to IS Governance
Course
Introduction to IS Governance

Introduction to IS Governance

Three videos provide an introduction to information security governance, including the use of governance and why it is important for an organization.

3 videos
11 minutes of training

Disaster Recovery
Course
Disaster Recovery

Disaster Recovery

Don't let a lack of preparedness compound the effects of a disaster. Learn how to create and test a disaster recovery plan in this six-video course.

6 videos
35 minutes of training

Preventative & Detective Measures
Course
Preventative & Detective Measures

Preventative & Detective Measures

Explore ways to prevent cyber threats from impacting your organization, and learn how to quickly detect the threats that do slip through your defenses.

7 videos
39 minutes of training

Computer Crime Investigations
Course
Computer Crime Investigations

Computer Crime Investigations

Refresh your knowledge of cybercrime investigations with this overview course covering the investigation process and the discovery of digital evidence.

4 videos
33 minutes of training

Access Control Fundamentals
Course
Access Control Fundamentals

Access Control Fundamentals

Take a deep dive into one of the fundamental concepts of security: access control. Learn how to give the right people access to the right information in a secure way.

22 videos
97 minutes of training

Asset Security
Course
Asset Security

Asset Security

Learn how to secure sensitive data, including managing and classifying data, working with data at rest and in transit, and implementing data security controls.

7 videos
39 minutes of training

Security Policies
Course
Security Policies

Security Policies

Explore security policies and control frameworks and how they help drive the overall security of an organization.

5 videos
22 minutes of training

Risk Management
Course
Risk Management

Risk Management

Dive deep into risk management, including risk frameworks, assessments and modeling, as well as employee security awareness, vendor security and other issues.

9 videos
48 minutes of training

 

What you’ll learn.

  • Information security governance
  • Risk and vulnerability assessments
  • Security metrics and controls
  • Incident response and recovery
  • Security strategies and frameworks
  • Security program activities and architecture
  • And more!

Who is this for?

At least two to three years of information security experience is recommended.

This skill path is designed for:

  • Cybersecurity managers
  • Security architects
  • Security engineers
  • Anyone with a desire to build their security management skills!

You're in good company

"Comparing Infosec to other vendors is like comparing apples to oranges. My instructor was hands-down the best I’ve had." 

James Coyle

FireEye, Inc.

"I knew Infosec could tell me what to expect on the exam and what topics to focus on most."

Julian Tang

Chief Information Officer

"I’ve taken five boot camps with Infosec and all my instructors have been great."

Jeffrey Coa

Information Security Systems Officer

Plans & Pricing

Personal

$299

Annually

Teams

$599 / license

Annually. Volume discounts available. 10 license minimum.