10 comprehensive modules covering all aspects of cyber operational risk. Complete them in order.
Core concepts, risk context, and course foundation.
Attacker techniques, common threat vectors, and risk signals.
Defensive controls, layered protection, and practical safeguards.
Remote work security, safe connectivity, and endpoint discipline.
Financial fraud patterns and AI-enabled attack scenarios.
Privacy principles, governance responsibilities, and controls.
Workplace physical controls and secure office practices.
Safe browsing habits, endpoint protection, and digital hygiene.
Cloud security, AI adoption risks, and supply chain threats.
Response workflow, escalation, and business continuity planning.