Designing & Executing Information Security Strategies: Online course

Posted by:
 
Share this on your social network:
   Facebook Twitter Google+    Comments Mail

Information Security Strategies

Designing and executing information security strategies course provides students with opportunities to integrate and apply information security knowledge.

About the Course
This course provides students with opportunities to integrate and apply information security knowledge. Following the case-study approach, they will be introduced to current, real-world cases developed and presented by the practitioner community. Students will design and execute information assurance strategies to solve these cases.

Course Syllabus
With successful completion of the course students should be able to:

  • Describe the nature of security risk in a business and an IT context
  • Compare and apply several models for security risk assessment
  • Facilitate a risk assessment process and gain consensus on risk-based decisions
  • Incorporate risk assessment into an IT security plan

Prerequisites

  • Ability to analyze cyber security threats and vulnerabilities in the context of an organization
  • Ability to analyze cyber security policies, plans and procedures
  • Understanding of the organizational governance principles in cyber security
  • Understanding of privacy, accountability and ethical behavior as it applies to cyber security.
  • Understanding of formal models for information security
  • General knowledge of risk management frameworks

Course Sessions
August 26, 2014 - November 4, 2014

For further information, click here.

Write a Comment