Developing Cybersecurity Programs and Policies in an AI-Driven World

This course includes
Interactive Lessons
Gamified TestPrep
Hands-On Labs
AI Tutor (Add-on)
Get A Free Trial

About This Course

Skills You’ll Get

1

Introduction

2

Understanding Cybersecurity Policy and Governance

  • Information Security vs. Cybersecurity Policies
  • Looking at Policy Through the Ages
  • Cybersecurity Policy
  • Cybersecurity Policy Life Cycle
  • Summary
  • Exercises
  • Projects
3

Cybersecurity Policy Organization, Format, and Styles

  • Policy Hierarchy
  • Writing Style and Technique
  • Policy Format
  • Summary
  • Exercises
  • Projects
4

Cybersecurity Frameworks

  • Confidentiality, Integrity, and Availability (CIA)
  • What Is a Cybersecurity Framework?
  • NIST Cybersecurity Framework
  • Summary
  • Exercises
  • Projects
  • References
5

Cloud Security

  • Why Cloud Computing?
  • Cloud Computing Models
  • Cloud Governance
  • Multitenancy
  • Core Components of the Cloud Computing Reference Architecture
  • Key Concepts and Functional Layers of Cloud Computing
  • Understanding Top Cybersecurity Risks in Cloud Computing
  • AI and the Cloud: Revolutionizing the Future of Computing
  • Summary
  • Exercises
  • References
6

Governance and Risk Management

  • Understanding Cybersecurity Policies
  • Cybersecurity Risk
  • Summary
  • Exercises
  • Projects
  • References
7

Asset Management and Data Loss Prevention

  • Information Assets and Systems
  • Information Classification
  • Labeling and Handling Standards
  • Information Systems Inventory
  • Understanding Data Loss Prevention Technologies
  • Summary
  • Exercises
  • Projects
  • References
8

Human Resources Security and Education

  • The Employee Life Cycle
  • The Importance of Employee Agreements
  • The Importance of Security Education and Training
  • Summary
  • Exercises
  • Projects
  • References
9

Physical and Environmental Security

  • Understanding the Secure Facility Layered Defense Model
  • Protecting Equipment
  • Environmental Sustainability
  • Summary
  • Exercises
  • Projects
  • References
10

Cybersecurity Operations (CyberOps), Incident Response, Digital Forensics, and Threat Hunting

  • Incident Response
  • What Happened? Investigation and Evidence Handling
  • Understanding Threat Hunting
  • Understanding Digital Forensic Analysis
  • Data Breach Notification Requirements
  • Summary
  • Exercises
  • Projects
  • References
11

Access Control Management

  • Access Control Fundamentals
  • Infrastructure Access Controls
  • User Access Controls
  • Summary
  • Exercises
  • Projects
  • References
12

Supply Chain Security, Information Systems Acquisition, Development, and Maintenance

  • Strengthening the Links: A Deep Dive into Supply Chain Security
  • System Security Requirements
  • Secure Code
  • Cryptography
  • Summary
  • Exercises
  • Projects
  • References
13

Business Continuity Management

  • Emergency Preparedness
  • Business Continuity Risk Management
  • The Business Continuity Plan
  • Business Continuity and Disaster Recovery in Cloud Services
  • Plan Testing and Maintenance
  • Summary
  • Exercises
  • Projects
  • References
14

Regulatory Compliance for Financial Institutions

  • The Gramm-Leach-Bliley Act
  • New York’s Department of Financial Services Cybersecurity Regulation
  • What Is a Regulatory Examination?
  • Personal and Corporate Identity Theft
  • Regulation of Fintech, Digital Assets, and Cryptocurrencies
  • Summary
  • Exercises
  • Projects
  • References
15

Regulatory Compliance for the Health-care Sector

  • The HIPAA Security Rule
  • The HITECH Act and the Omnibus Rule
  • Understanding the HIPAA Compliance Enforcement Process
  • Summary
  • Exercises
  • Projects
  • References
16

PCI Compliance for Merchants

  • Protecting Cardholder Data
  • PCI Compliance
  • Summary
  • Exercises
  • Projects
  • References
17

Privacy in an AI-Driven Landscape

  • Defining Privacy in the Digital Context
  • The Interplay Between AI and Privacy
  • General Data Protection Regulation (GDPR)
  • California Consumer Privacy Act (CCPA)
  • Personal Information Protection and Electronic Documents Act (PIPEDA)
  • Data Protection Act 2018 in the United Kingdom
  • Leveraging AI to Enhance Privacy Protections
  • Summary
  • Exercises
  • Project
  • References
18

Artificial Intelligence Governance and Regulations

  • The AI Double-Edged Sword
  • Generative AI, LLMs, and Traditional Machine Learning Implementations
  • Introduction to AI Governance
  • The U.S. Executive Order on the Safe, Secure, an...y Development and Use of Artificial Intelligence
  • The Importance of High Accuracy and Precision in AI Systems
  • Explainable AI (XAI): Building Trust and Understanding
  • Government and Society-wide Approaches to AI Governance
  • The EU AI Act
  • Guidelines for Secure AI System Development
  • OWASP Top 10 Risks for LLM
  • MITRE ATLAS Framework
  • Summary
  • Exercises
  • Project
  • References

1

Understanding Cybersecurity Policy and Governance

  • Understanding Cybersecurity Policy and Governance
2

Cybersecurity Policy Organization, Format, and Styles

  • Exploring Cybersecurity Policy Templates
3

Cybersecurity Frameworks

  • Understanding and Implementing the NIST Cybersecurity Framework
4

Cloud Security

  • Exploring the Integration of AI and Cloud Computing
5

Governance and Risk Management

  • Analyzing and Developing Cybersecurity Policies
6

Asset Management and Data Loss Prevention

  • Exploring Data Loss Prevention (DLP) Technologies and Their Role in Cybersecurity
7

Human Resources Security and Education

  • Exploring Security Education and Training: Building a Cybersecurity-Aware Workforce
8

Physical and Environmental Security

  • Implementing Physical Security
  • Integrating Environmental Sustainability into Organizational Strategy
9

Cybersecurity Operations (CyberOps), Incident Response, Digital Forensics, and Threat Hunting

  • Leveraging AI for Enhanced Threat Intelligence in Cybersecurity
  • Examining MITRE ATT&CK
  • Completing the Chain of Custody Form
10

Access Control Management

  • Enabling an ACL
  • Analyzing Pwned Passwords
  • Configuring a Firewall
  • Setting Up a DMZ
  • Implementing Intrusion Detection and Prevention
11

Supply Chain Security, Information Systems Acquisition, Development, and Maintenance

  • Fuzzing Using OWASP ZAP
  • Examining PKI Certificates
  • Creating Asymmetric Key Pairs
  • Understanding Symmetric Key Cryptography
12

Business Continuity Management

  • Understanding Business Continuity and Disaster Recovery in Cloud Environments
13

Regulatory Compliance for Financial Institutions

  • Understanding Personal and Corporate Identity Theft
14

Regulatory Compliance for the Health-care Sector

  • Ensuring Compliance with the HIPAA Security Rule
15

PCI Compliance for Merchants

  • Safeguarding Cardholder Data: Exploring PCI DSS Compliance
16

Privacy in an AI-Driven Landscape

  • Balancing AI and Privacy: Exploring Privacy-Preserving Techniques in AI
17

Artificial Intelligence Governance and Regulations

  • Enhancing Accuracy and Precision in AI Systems: A Critical Analysis
  • Implementing Guidelines for Secure AI System Development

Related Courses

All Course
scroll to top