• Home
  • Coursework
    • Cybersecurity Fundamentals
    • Cryptography
    • Enterprise Security Architecture
    • Cybersecurity Law & Policy
    • Cybersecurity Risk Management
    • Management and Cybersecurity
    • Secure Software Design and Development
    • Network Visualization and Vulnerability Detection
    • Cyber Threat Intelligence
    • Incident Response and Computer Network Forensics
  • Reference Link Library
  • Contact
Course Summary
Cybersecurity fundamentals, or CSOL 500, was the first course in the Masters of Cybersecurity Operations and Leadership program. This course provides a broad overview of what leadership in the field of cybersecurity looks like by facilitating an understanding of why information is an asset to organizations and what threats hinder vulnerability to the existence of that asset, as well as covering the basics of developing a cybersecurity program. The Cybersecurity fundamentals course was one of my favorites for a few good reasons, including but not limited to broadening my knowledge of cybersecurity terminology, incident management, and remediation planning.

Course Artifacts
Cloud Vulnerabilities
File Size: 504 kb
File Type: pdf
Download File

Policy, Standards, and Procedures Discussion
File Size: 44 kb
File Type: pdf
Download File

Reflections
Accepting a leadership role in cybersecurity comes with great responsibility. Cybersecurity leaders will need to be up to speed on information security threats from a technical standpoint, understand how to implement security planning into a business objective, and understand how to build a broader cybersecurity program and a risk-based approach (Sans.org, n.d.).
           
​The increasing shift of organizations onto the public cloud (GCP, AWS, Azure, or Alibaba) prompted me to select the cloud vulnerabilities coursework artifact. While the public cloud enables organizations to develop at an unprecedented speed, security issues come along with it. Leaders in cybersecurity must modify traditional security processes to include changes introduced by the public cloud (Soh, 2021). 


The second coursework artifact was selected because cybersecurity, IT professionals, and privacy and legal professionals routinely abuse the terms “policy” and “standard” as if these words were synonyms. In the context of good cybersecurity planning, policies, standards, and procedures are vital components of a hierarchy that build on each other to build an overarching governance architecture that utilizes an integrated approach to management requirements. “cybersecurity & data protection documentation is meant to address the “who, what, when, how & why” across the strategic, operational and tactical needs of your organization (Complianceforge.com, n.d.).”

Cybersecurity is a shared responsibility throughout the organization and is no longer just a concern of IT professionals. From the C-suite to field employees, everyone with access to information systems is responsible for protecting the systems from intruders. Every leader in cybersecurity and I must incorporate the knowledge learned here and throughout their journey into educating their organizations' employees to promote the broadened goal of preserving confidentiality, integrity, and availability of information. 

Master of Cybersecurity Operations and Leadership course CSOL 500 was excellent and successfully delivered a broad understanding of incident management and remediation planning and identified the roles leaders can play in enhancing, supporting, and promoting cybersecurity in organizations (Sandiego.edu, n.d.). 






References
Complianceforge.com. (n.d.). Policies vs Standards vs Controls vs Procedures. ComplianceForge. Retrieved February 6, 2023, from https://www.complianceforge.com/faq/word-crimes/policy-vs-standard-vs-control-vs-procedure
Sandiego.edu. (n.d.). CyberSecurityOperations/Ldrshp (CSOL). University of San Diego. Retrieved February 6, 2023, from https://catalogs.sandiego.edu/graduate/courses/csol/
Sans.org. (n.d.). SANS Cybersecurity Leadership Triads. SANS Institute. Retrieved February 6, 2023, from https://www.sans.org/cybersecurity-leadership/triads/
Soh, T. (2021, May 18). Why vulnerability management is essential for cloud security. Horangi Cyber Security. Retrieved February 6, 2023, from https://www.horangi.com/blog/cloud-vulnerability-management

​
  • Home
  • Coursework
    • Cybersecurity Fundamentals
    • Cryptography
    • Enterprise Security Architecture
    • Cybersecurity Law & Policy
    • Cybersecurity Risk Management
    • Management and Cybersecurity
    • Secure Software Design and Development
    • Network Visualization and Vulnerability Detection
    • Cyber Threat Intelligence
    • Incident Response and Computer Network Forensics
  • Reference Link Library
  • Contact