Cybersecurity Risk Management

Tong Sun, RITx

Learn key principles of risk analysis, risk assessment and risk mitigation for information security using both qualitative and quantitative methodologies.

Cybersecurity risk management guides a growing number of IT decisions. Cybersecurity risks continue to have critical impacts on overall IT risk modeling, assessment and mitigation.

In this course, you will learn about the general information security risk management framework and its practices and how to identify and model information security risks and apply both qualitative and quantitative risk assessment methods. Understanding this framework will enable you to articulate the business consequences of identified information security risks. These skills are essential for any successful information security professional.

The goal of this course is to teach students the risk management framework with both qualitative and quantitative assessment methods that concentrate on the information security (IS) aspect of IT risks. The relationship between the IT risk and business value will be discussed through several industry case studies.

First, you will learn about the principles of risk management and its three key elements: risk analysis, risk assessment and risk mitigation. You will learn to identify information security related threats, vulnerability, determine the risk level, define controls and safeguards, and conduct cost-benefit analysis or business impact analysis.

Second, we will introduce the qualitative and quantitative frameworks and discuss the differences between these two frameworks. You will learn the details of how to apply these frameworks in assessing information security risk.

Third, we will extend the quantitative framework with data mining and machine learning approaches that are applicable for data-driven risk analytics. You will explore the intersection of information security, big data and artificial intelligence.

Finally, you will analyze a series of extended case studies, which will help you to comprehend and generalize the principles, frameworks and analytical methods in actual examples.

This offering is part of the RITx Cybersecurity MicroMasters Program that prepares students to enter and advance in the field of computing security.

What will you learn

  • Information security risk management framework and methodologies
  • Identifying and modeling information security risks
  • Qualitative and quantitative risk assessment methods
  • Articulating information security risks as business consequences

会期:
  • 2019年8月06日
介绍:
  • 免费:
  • 收费:
  • 证书:
  • MOOC:
  • 视频讲座:
  • 音频讲座:
  • Email-课程:
  • 语言: 英语 Gb

反馈

目前这个课程还没有反馈。您想要留第一个反馈吗?

请注册, 为了写反馈

还有这个题目的:
23ed8d2e-5ca3-47d4-9971-ec7749c5c18b-b11b604b74ce.small Digital Technology and Innovation
Look at digital technology and innovation from the perspective of a chief information...
Efc25613-f0ea-4423-bfcd-4d94c317f085-48b2f71dde5b.small Tech for Good: The Role of ICT in Achieving the SDGs
What opportunities and challenges do digital technologies present for the development...
Large-icon2b Designing and Executing Information Security Strategies
This course provides you with opportunities to integrate and apply your information...
Cybersecurity_378x225 Economics of Cybersecurity
Learn how to measure the costs and assess the importance of securing your business...
Computerlock-logo_2 Cybersecurity and Its Ten Domains
Learn about the ten domains of cybersecurity through the lens of subject area...
还有标题«计算机科学»:
Regular_7d911eb6-1549-4551-aef8-7a752052d4fb Social Media Analytics: Using Data to Understand Public Conversations
How can you discover what’s being said about the things that matter to you on...
967eee29-87e8-4f2d-9257-a1b38ec07e85-2ad0c7c92b16.small IoT Sensors and Devices
Explore various IoT devices and sensor types, how they work, and how we connect...
E56e7660-bc94-46fd-95c5-ae3f765da60c-013a6523f53d.small Model-Based Automotive Systems Engineering
Learn how to model and simulate system dynamics in automotive engineering Modeling...
C9d14131-a515-462b-82e2-6eaec5bc1c17-f7c5de2ca2ae.small Using Python for Research
Take your introductory knowledge of Python programming to the next level and...
A3e17192-cf3f-4782-9aab-2206b0dc2c90-7202ea5d5042.small Business Considerations for 5G, IoT and AI
Learn how networks are being redefined to support a 5G world and what is required...
还有edX:
967eee29-87e8-4f2d-9257-a1b38ec07e85-2ad0c7c92b16.small IoT Sensors and Devices
Explore various IoT devices and sensor types, how they work, and how we connect...
8c411679-4105-4de9-8a4c-9c5b3f4a33a6-0cf4f35d9692.small The Architectural Imagination
Learn fundamental principles of architecture — as an academic subject...
E56e7660-bc94-46fd-95c5-ae3f765da60c-013a6523f53d.small Model-Based Automotive Systems Engineering
Learn how to model and simulate system dynamics in automotive engineering Modeling...
C9d14131-a515-462b-82e2-6eaec5bc1c17-f7c5de2ca2ae.small Using Python for Research
Take your introductory knowledge of Python programming to the next level and...
3b15de0f-832c-4474-b9c8-1fd1b398d372-d0b00b9d9f77.small Customer-Centric Innovation
Learn to take on competition by creating successful and innovative ideas for...

© 2013-2019