This course equips learners with essential knowledge and skills to build and maintain a resilient cybersecurity framework. Cyber resilience is critical in the modern world, where digital systems face evolving threats. The course focuses on understanding how to protect, detect, respond, and recover from cybersecurity incidents.

Cyber Resilience: Building Strong Cybersecurity Systems
Ends soon: Grow your skills with Coursera Plus for $239/year (usually $399). Save now.

Cyber Resilience: Building Strong Cybersecurity Systems

Instructor: Packt - Course Instructors
Included with
Recommended experience
Recommended experience
Beginner level
Professionals in cybersecurity, risk management, or business continuity. Basic digital systems knowledge required.
Recommended experience
Recommended experience
Beginner level
Professionals in cybersecurity, risk management, or business continuity. Basic digital systems knowledge required.
What you'll learn
Understand the evolving cyber threat landscape.
Apply core principles of cybersecurity risk management.
Implement defense-in-depth strategies for system security.
Details to know

Add to your LinkedIn profile
April 2026
27 assignments
See how employees at top companies are mastering in-demand skills

There are 27 modules in this course
In this section, we examine the dynamic cyber threat landscape, focusing on rapid vulnerability exploitation and the challenges of timely patching for effective risk management.
What's included
2 videos1 reading1 assignment
2 videos•Total 2 minutes
- Course Overview•1 minute
- The Cyber Threat Landscape - Overview Video•1 minute
1 reading•Total 10 minutes
- The Cyber Threat Landscape - The Reading•10 minutes
1 assignment•Total 10 minutes
- Navigating the Cyber Threat Landscape•10 minutes
In this section, we examine legal and contractual requirements shaping security practices. Key concepts include data privacy laws, critical infrastructure standards, and contractual obligations for compliance and accountability.
What's included
1 video1 reading1 assignment
1 video•Total 1 minute
- Legal and Contractual Requirements - Overview Video•1 minute
1 reading•Total 10 minutes
- Legal and Contractual Requirements - The Reading•10 minutes
1 assignment•Total 10 minutes
- Legal and Contractual Requirements in Data Protection•10 minutes
In this section, we define key security terminology, distinguish between security events and incidents, and apply defence in depth principles to enhance threat management practices.
What's included
1 video2 readings1 assignment
1 video•Total 1 minute
- Key Terms and Concepts - Overview Video•1 minute
2 readings•Total 20 minutes
- Introduction•10 minutes
- Defence in Depth•10 minutes
1 assignment•Total 10 minutes
- Foundations of Cybersecurity and Information Protection•10 minutes
In this section, we explore security trade-offs and how to make balanced decisions for effective protection.
What's included
1 video2 readings1 assignment
1 video•Total 1 minute
- Managing the Risks - Overview Video•1 minute
2 readings•Total 20 minutes
- Introduction•10 minutes
- Risk Appetite•10 minutes
1 assignment•Total 10 minutes
- Risk Management Fundamentals•10 minutes
In this section, we examine the three security pillars-people, processes, and technology-and their interdependence in mitigating risks through training, policies, and practical implementation.
What's included
1 video1 reading1 assignment
1 video•Total 1 minute
- Three Security Pillars - Overview Video•1 minute
1 reading•Total 5 minutes
- Three Security Pillars - The Reading•5 minutes
1 assignment•Total 10 minutes
- Security Fundamentals and Human Behavior•10 minutes
In this section, we explore defence in depth, focusing on prevention, detection, and response to enhance cyber resilience and manage threats effectively.
What's included
1 video2 readings1 assignment
1 video•Total 1 minute
- Layers of Defence in Depth - Overview Video•1 minute
2 readings•Total 20 minutes
- Introduction•10 minutes
- Response•10 minutes
1 assignment•Total 10 minutes
- Layers of Defence in Depth•10 minutes
In this section, we map reference controls to defence-in-depth layers, emphasizing risk-based selection and multi-layered security implementation for practical cyber resilience.
What's included
1 video1 reading1 assignment
1 video•Total 1 minute
- Mapping the Layers Against the Part 2 Reference Controls - Overview Video•1 minute
1 reading•Total 10 minutes
- Mapping the Layers Against the Part 2 Reference Controls - The Reading•10 minutes
1 assignment•Total 10 minutes
- Layered Security Control Implementation•10 minutes
In this section, we explore practical steps for aligning security frameworks with organisational needs, defining clear objectives, and conducting gap analyses to identify weaknesses.
What's included
1 video1 reading1 assignment
1 video•Total 1 minute
- Implementation Tips - Overview Video•1 minute
1 reading•Total 10 minutes
- Implementation Tips - The Reading•10 minutes
1 assignment•Total 10 minutes
- Security Implementation Fundamentals•10 minutes
In this section, we explore asset management, focusing on identifying information assets, maintaining accurate inventories, and optimising usage for security and cost efficiency.
What's included
1 video1 reading1 assignment
1 video•Total 1 minute
- Asset Management - Overview Video•1 minute
1 reading•Total 10 minutes
- Asset Management - The Reading•10 minutes
1 assignment•Total 10 minutes
- Asset Management Fundamentals•10 minutes
In this section, we examine how board-level commitment influences cybersecurity success. Key concepts include executive support, strategic alignment, and leadership impact on security outcomes.
What's included
1 video1 reading1 assignment
1 video•Total 1 minute
- Board-Level Commitment and Involvement - Overview Video•1 minute
1 reading•Total 10 minutes
- Board-Level Commitment and Involvement - The Reading•10 minutes
1 assignment•Total 10 minutes
- Board-Level Cybersecurity Leadership•10 minutes
In this section, we explore business continuity management, focusing on risk mitigation, plan development, and disruption response to ensure organizational resilience and operational continuity.
What's included
1 video1 reading1 assignment
1 video•Total 1 minute
- Business Continuity Management - Overview Video•1 minute
1 reading•Total 10 minutes
- Business Continuity Management - The Reading•10 minutes
1 assignment•Total 10 minutes
- Business Continuity Management Fundamentals•10 minutes
In this section, we explore configuration hardening and patch management to reduce security risks. Key concepts include disabling unnecessary functions, applying updates, and minimizing attack surfaces.
What's included
1 video1 reading1 assignment
1 video•Total 1 minute
- Configuration and Patch Management - Overview Video•1 minute
1 reading•Total 10 minutes
- Configuration and Patch Management - The Reading•10 minutes
1 assignment•Total 10 minutes
- Configuration and Patch Management Fundamentals•10 minutes
In this section, we explore continual improvement processes to adapt security measures to evolving threats. Key concepts include threat analysis, risk mitigation, and maintaining security maturity through regular adjustments.
What's included
1 video1 reading1 assignment
1 video•Total 1 minute
- Continual Improvement Process - Overview Video•1 minute
1 reading•Total 10 minutes
- Continual Improvement Process - The Reading•10 minutes
1 assignment•Total 10 minutes
- Continuous Process Enhancement and Evaluation•10 minutes
In this section, we explore encryption techniques for securing data at rest and in transit, evaluate encryption alternatives, and emphasize secure key management practices for real-world data protection.
What's included
1 video1 reading1 assignment
1 video•Total 1 minute
- Encryption - Overview Video•1 minute
1 reading•Total 10 minutes
- Encryption - The Reading•10 minutes
1 assignment•Total 10 minutes
- Encryption and Data Protection Fundamentals•10 minutes
In this section, we examine external certification benefits, including trust building, compliance, and business growth, while exploring frameworks like Cyber Essentials and ISO 27001 for structured security strategies.
What's included
1 video1 reading1 assignment
1 video•Total 1 minute
- External Certification/Validation - Overview Video•1 minute
1 reading•Total 10 minutes
- External Certification/Validation - The Reading•10 minutes
1 assignment•Total 10 minutes
- External Certification and Validation in Cybersecurity•10 minutes
In this section, we examine IAAA controls, the need to know principle, and least privilege to manage user access and reduce security risks in organisations.
What's included
1 video1 reading1 assignment
1 video•Total 1 minute
- Identity and Access Control - Overview Video•1 minute
1 reading•Total 10 minutes
- Identity and Access Control - The Reading•10 minutes
1 assignment•Total 10 minutes
- Identity and Access Control Fundamentals•10 minutes
In this section, we examine incident response management, emphasizing prepared plans, detection measures, and defense-in-depth strategies to minimize breach impacts.
What's included
1 video1 reading1 assignment
1 video•Total 1 minute
- Incident Response Management - Overview Video•1 minute
1 reading•Total 10 minutes
- Incident Response Management - The Reading•10 minutes
1 assignment•Total 10 minutes
- Incident Response Fundamentals•10 minutes
In this section, we examine internal audits as tools for verifying security measures against standards, identifying weaknesses, and supporting continual improvement through objective evaluation.
What's included
1 video1 reading1 assignment
1 video•Total 1 minute
- Internal Audits - Overview Video•1 minute
1 reading•Total 10 minutes
- Internal Audits - The Reading•10 minutes
1 assignment•Total 10 minutes
- Internal Audit Fundamentals•10 minutes
In this section, we examine malware protection strategies, including anti-malware software, firewalls, data scanning, and staff training to reduce infection risks through technical and human measures.
What's included
1 video1 reading1 assignment
1 video•Total 1 minute
- Malware Protection - Overview Video•1 minute
1 reading•Total 10 minutes
- Malware Protection - The Reading•10 minutes
1 assignment•Total 10 minutes
- Malware Protection Fundamentals•10 minutes
In this section, we explore network asset identification, security zone organization, and implementation of firewalls and DMZs to enhance network protection and data security.
What's included
1 video1 reading1 assignment
1 video•Total 1 minute
- Network and Communications Security - Overview Video•1 minute
1 reading•Total 10 minutes
- Network and Communications Security - The Reading•10 minutes
1 assignment•Total 10 minutes
- Network Security Fundamentals•10 minutes
In this section, we examine physical and environmental security measures, emphasizing secure perimeters, hardware protection, and environmental risk analysis to enhance overall system integrity.
What's included
1 video1 reading1 assignment
1 video•Total 1 minute
- Physical and Environmental Security - Overview Video•1 minute
1 reading•Total 10 minutes
- Physical and Environmental Security - The Reading•10 minutes
1 assignment•Total 10 minutes
- Physical and Environmental Security Fundamentals•10 minutes
In this section, we explore continuous security monitoring, log generation, and analysis for detecting threats and supporting incident response. Key concepts include real-time observation, log management, and forensic readiness.
What's included
1 video1 reading1 assignment
1 video•Total 1 minute
- Security Monitoring - Overview Video•1 minute
1 reading•Total 10 minutes
- Security Monitoring - The Reading•10 minutes
1 assignment•Total 10 minutes
- Security Monitoring Fundamentals•10 minutes
In this section, we examine how documented security policies and procedures ensure organisational compliance, consistency, and accountability, while highlighting the importance of continuous policy review and alignment with evolving requirements.
What's included
1 video1 reading1 assignment
1 video•Total 1 minute
- Security Policies - Overview Video•1 minute
1 reading•Total 10 minutes
- Security Policies - The Reading•10 minutes
1 assignment•Total 10 minutes
- Security Policy Fundamentals•10 minutes
In this section, we explore tailored security training for dedicated roles and general staff, emphasizing effective risk management through role-specific programs and awareness strategies.
What's included
1 video1 reading1 assignment
1 video•Total 1 minute
- Staff Training and Awareness - Overview Video•1 minute
1 reading•Total 10 minutes
- Staff Training and Awareness - The Reading•10 minutes
1 assignment•Total 10 minutes
- Staff Training and Awareness in Security•10 minutes
In this section, we examine supply chain security, emphasizing due diligence, SLA reviews, and risk assessments to mitigate third-party vulnerabilities.
What's included
1 video1 reading1 assignment
1 video•Total 1 minute
- Supply Chain Security - Overview Video•1 minute
1 reading•Total 10 minutes
- Supply Chain Security - The Reading•10 minutes
1 assignment•Total 10 minutes
- Supply Chain Security and Contractual Responsibilities•10 minutes
In this section, we examine system risks based on access types, implement input sanitisation for web services, and design security measures for system interactions.
What's included
1 video1 reading1 assignment
1 video•Total 1 minute
- System Security - Overview Video•1 minute
1 reading•Total 10 minutes
- System Security - The Reading•10 minutes
1 assignment•Total 10 minutes
- System Security Fundamentals•10 minutes
In this section, we explore vulnerability scanning and penetration testing to identify system weaknesses. Key concepts include using tools, analyzing results, and integrating security testing into programs.
What's included
1 video1 reading1 assignment
1 video•Total 1 minute
- Vulnerability Scanning and Penetration Testing - Overview Video•1 minute
1 reading•Total 10 minutes
- Vulnerability Scanning and Penetration Testing - The Reading•10 minutes
1 assignment•Total 10 minutes
- Security Testing Fundamentals•10 minutes
Instructor

Offered by

Offered by

Packt helps tech professionals put software to work by distilling and sharing the working knowledge of their peers. Packt is an established global technical learning content provider, founded in Birmingham, UK, with over twenty years of experience delivering premium, rich content from groundbreaking authors on a wide range of emerging and popular technologies.
Explore more from Security

Course
Category: Credit offeredCredit offered
Course
Category: Credit offeredCredit offered
MMacquarie University
Specialization
Status: Free TrialFree TrialCategory: Credit offeredCredit offered
Course
Status: Free TrialFree TrialCategory: Credit offeredCredit offered
Why people choose Coursera for their career

Felipe M.

Jennifer J.

Larry W.

Chaitanya A.

Open new doors with Coursera Plus
Unlimited access to 10,000+ world-class courses, hands-on projects, and job-ready certificate programs - all included in your subscription
Advance your career with an online degree
Earn a degree from world-class universities - 100% online
Join over 3,400 global companies that choose Coursera for Business
Upskill your employees to excel in the digital economy
Frequently asked questions
Yes, you can preview the first video and view the syllabus before you enroll. You must purchase the course to access content not included in the preview.
If you decide to enroll in the course before the session start date, you will have access to all of the lecture videos and readings for the course. You’ll be able to submit assignments once the session starts.
Once you enroll and your session begins, you will have access to all videos and other resources, including reading items and the course discussion forum. You’ll be able to view and submit practice assessments, and complete required graded assignments to earn a grade and a Course Certificate.
If you complete the course successfully, your electronic Course Certificate will be added to your Accomplishments page - from there, you can print your Course Certificate or add it to your LinkedIn profile.
This course is currently available only to learners who have paid or received financial aid, when available.
Yes. In select learning programs, you can apply for financial aid or a scholarship if you can’t afford the enrollment fee. If fin aid or scholarship is available for your learning program selection, you’ll find a link to apply on the description page.
More questions
Financial aid available,