Skip to main content

Cyber Security Risk Management; Mastering the Gordon Loeb Model for Information Security and Compliance

$199.00
When you get access:
Course access is prepared after purchase and delivered via email
How you learn:
Self-paced • Lifetime updates
Your guarantee:
30-day money-back guarantee — no questions asked
Who trusts this:
Trusted by professionals in 160+ countries
Toolkit Included:
Includes a practical, ready-to-use toolkit with implementation templates, worksheets, checklists, and decision-support materials so you can apply what you learn immediately - no additional setup required.
Adding to cart… The item has been added

Cyber Security Risk Management: Mastering the Gordon Loeb Model for Information Security and Compliance



Course Overview

This comprehensive course is designed to equip participants with the knowledge and skills necessary to master the Gordon Loeb Model for cyber security risk management. The course provides a thorough understanding of the model's principles and applications, as well as its relevance to information security and compliance. Upon completion, participants will receive a certificate issued by The Art of Service.



Course Features

  • Interactive and engaging learning experience
  • Comprehensive and up-to-date content
  • Personalized learning approach
  • Practical and real-world applications
  • High-quality content developed by expert instructors
  • Certificate issued by The Art of Service upon completion
  • Flexible learning schedule
  • User-friendly and mobile-accessible platform
  • Community-driven learning environment
  • Actionable insights and hands-on projects
  • Bite-sized lessons for easy learning
  • Lifetime access to course materials
  • Gamification and progress tracking features


Course Outline

Module 1: Introduction to Cyber Security Risk Management

  • Defining cyber security risk management
  • Understanding the importance of risk management in cyber security
  • Overview of the Gordon Loeb Model
  • Principles of risk management
  • Risk management frameworks and standards

Module 2: Understanding the Gordon Loeb Model

  • History and development of the Gordon Loeb Model
  • Key components of the model
  • Risk analysis and assessment
  • Risk mitigation and control
  • Monitoring and review

Module 3: Information Security and Compliance

  • Overview of information security
  • Understanding compliance and regulatory requirements
  • Information security frameworks and standards
  • Compliance and risk management
  • Case studies and examples

Module 4: Applying the Gordon Loeb Model

  • Implementing the Gordon Loeb Model in practice
  • Risk assessment and analysis techniques
  • Risk mitigation and control strategies
  • Monitoring and review processes
  • Case studies and examples

Module 5: Cyber Security Risk Management in the Real World

  • Real-world applications of the Gordon Loeb Model
  • Case studies and examples
  • Best practices and lessons learned
  • Future directions and emerging trends
  • Conclusion and final thoughts

Module 6: Cyber Security Risk Management Tools and Techniques

  • Overview of cyber security risk management tools
  • Risk assessment and analysis tools
  • Risk mitigation and control tools
  • Monitoring and review tools
  • Case studies and examples

Module 7: Cyber Security Risk Management for Cloud Computing

  • Overview of cloud computing and cyber security risks
  • Applying the Gordon Loeb Model to cloud computing
  • Risk assessment and analysis techniques for cloud computing
  • Risk mitigation and control strategies for cloud computing
  • Monitoring and review processes for cloud computing

Module 8: Cyber Security Risk Management for IoT

  • Overview of IoT and cyber security risks
  • Applying the Gordon Loeb Model to IoT
  • Risk assessment and analysis techniques for IoT
  • Risk mitigation and control strategies for IoT
  • Monitoring and review processes for IoT

Module 9: Cyber Security Risk Management for Artificial Intelligence and Machine Learning

  • Overview of AI and ML and cyber security risks
  • Applying the Gordon Loeb Model to AI and ML
  • Risk assessment and analysis techniques for AI and ML
  • Risk mitigation and control strategies for AI and ML
  • Monitoring and review processes for AI and ML

Module 10: Cyber Security Risk Management for Big Data

  • Overview of big data and cyber security risks
  • Applying the Gordon Loeb Model to big data
  • Risk assessment and analysis techniques for big data
  • Risk mitigation and control strategies for big data
  • Monitoring and review processes for big data

Module 11: Cyber Security Risk Management for Cyber-Physical Systems

  • Overview of cyber-physical systems and cyber security risks
  • Applying the Gordon Loeb Model to cyber-physical systems
  • Risk assessment and analysis techniques for cyber-physical systems
  • Risk mitigation and control strategies for cyber-physical systems
  • Monitoring and review processes for cyber-physical systems

Module 12: Cyber Security Risk Management for Supply Chain Management

  • Overview of supply chain management and cyber security risks
  • Applying the Gordon Loeb Model to supply chain management
  • Risk assessment and analysis techniques for supply chain management
  • Risk mitigation and control strategies for supply chain management
  • Monitoring and review processes for supply chain management

Module 13: Cyber Security Risk Management for Business Continuity Management

  • Overview of business continuity management and cyber security risks
  • Applying the Gordon Loeb Model to business continuity management
  • Risk assessment and analysis techniques for business continuity management
  • Risk mitigation and control strategies for business continuity management
  • Monitoring and review processes for business continuity management

Module 14: Cyber Security Risk Management for IT Service Management

  • Overview of IT service management and cyber security risks
  • Applying the Gordon Loeb Model to IT service management
  • Risk assessment and analysis techniques for IT service management
  • Risk mitigation and control strategies for IT service management
  • Monitoring and review processes for IT service management

Module 15: Cyber Security Risk Management for Project Management

  • Overview of project management and cyber security risks
  • Applying the Gordon Loeb Model to project management
  • Risk assessment and analysis techniques for project management
  • Risk mitigation and control strategies for project management
  • Monitoring and review processes for project management

Module 16: Cyber Security Risk Management for Change Management

  • Overview of change management and cyber security risks
  • Applying the Gordon Loeb Model to change management
  • Risk assessment and analysis techniques for change management
  • Risk mitigation and control strategies for change management
  • Monitoring and review processes for change management

Module 17: Cyber Security Risk Management for Incident Response

  • Overview of incident response and cyber security risks
  • Applying the Gordon Loeb Model to incident response
  • Risk assessment and analysis techniques for incident response
  • Risk mitigation and control strategies for incident response
  • Monitoring and review processes for incident response

Module 18: Cyber Security Risk Management for Disaster Recovery

  • Overview of disaster recovery and cyber security risks
  • Applying the Gordon Loeb Model to disaster recovery
  • Risk assessment and analysis techniques for disaster recovery
  • Risk mitigation and control strategies for disaster recovery
  • Monitoring and review processes for disaster recovery

Module 19: Cyber Security Risk Management for Business Resilience

  • Overview of business resilience and cyber,