Cybersecurity Risk Management

Tong Sun, RITx

Learn key principles of risk analysis, risk assessment and risk mitigation for information security using both qualitative and quantitative methodologies.

Cybersecurity risk management guides a growing number of IT decisions. Cybersecurity risks continue to have critical impacts on overall IT risk modeling, assessment and mitigation.

In this course, you will learn about the general information security risk management framework and its practices and how to identify and model information security risks and apply both qualitative and quantitative risk assessment methods. Understanding this framework will enable you to articulate the business consequences of identified information security risks. These skills are essential for any successful information security professional.

The goal of this course is to teach students the risk management framework with both qualitative and quantitative assessment methods that concentrate on the information security (IS) aspect of IT risks. The relationship between the IT risk and business value will be discussed through several industry case studies.

First, you will learn about the principles of risk management and its three key elements: risk analysis, risk assessment and risk mitigation. You will learn to identify information security related threats, vulnerability, determine the risk level, define controls and safeguards, and conduct cost-benefit analysis or business impact analysis.

Second, we will introduce the qualitative and quantitative frameworks and discuss the differences between these two frameworks. You will learn the details of how to apply these frameworks in assessing information security risk.

Third, we will extend the quantitative framework with data mining and machine learning approaches that are applicable for data-driven risk analytics. You will explore the intersection of information security, big data and artificial intelligence.

Finally, you will analyze a series of extended case studies, which will help you to comprehend and generalize the principles, frameworks and analytical methods in actual examples.

This offering is part of the RITx Cybersecurity MicroMasters Program that prepares students to enter and advance in the field of computing security.

What will you learn

  • Information security risk management framework and methodologies
  • Identifying and modeling information security risks
  • Qualitative and quantitative risk assessment methods
  • Articulating information security risks as business consequences

会期:
  • 2020年1月07日
介绍:
  • 免费:
  • 收费:
  • 证书:
  • MOOC:
  • 视频讲座:
  • 音频讲座:
  • Email-课程:
  • 语言: 英语 Gb

反馈

目前这个课程还没有反馈。您想要留第一个反馈吗?

请注册, 为了写反馈

Show?id=n3eliycplgk&bids=695438
NVIDIA
还有这个题目的:
23ed8d2e-5ca3-47d4-9971-ec7749c5c18b-b11b604b74ce.small Digital Technology and Innovation
Look at digital technology and innovation from the perspective of a chief information...
Large-icon2b Designing and Executing Information Security Strategies
This course provides you with opportunities to integrate and apply your information...
Cybersecurity_378x225 Economics of Cybersecurity
Learn how to measure the costs and assess the importance of securing your business...
Computerlock-logo_2 Cybersecurity and Its Ten Domains
Learn about the ten domains of cybersecurity through the lens of subject area...
Computerlock-logo_2 Cybersecurity and Its Ten Domains
This course is designed to introduce students, working professionals and the...
还有标题«计算机科学»:
695ff980-b45a-425f-bee6-51bf6e962d90-de2d1a1c22e0.small Video Game Design History
Learn about the evolution of video games from experts at The Strong National...
595aa0b6-077d-439b-a651-95a9ee65c51a-fc966dc2648f.small Video Game Design and Balance
Learn about the video game design process and experiment with effective methods...
Fcd236ea-68ae-46f7-b991-849a41cebc64-0ea84acf6bad.small Video Game Asset Creation and Process
Learn about the tools, processes and platforms that allow video game assets...
Regular_7e290d30-8e84-46b2-bf50-801246fb157c Advanced Data Mining with Weka
Learn how to use popular packages that extend Weka's functionality and areas...
Regular_0b883f52-bc27-40f6-b633-d5fa9dd1101a Prepare to Run a Code Club
Build your confidence and get practical advice on launching and running a Code...
还有edX:
4178fda1-e8c7-476c-81e8-8a6b453a6a76-569208c21635.small Humanitarian Response to Conflict and Disaster
Learn the principles guiding humanitarian response to modern emergencies, and...
695ff980-b45a-425f-bee6-51bf6e962d90-de2d1a1c22e0.small Video Game Design History
Learn about the evolution of video games from experts at The Strong National...
595aa0b6-077d-439b-a651-95a9ee65c51a-fc966dc2648f.small Video Game Design and Balance
Learn about the video game design process and experiment with effective methods...
Fcd236ea-68ae-46f7-b991-849a41cebc64-0ea84acf6bad.small Video Game Asset Creation and Process
Learn about the tools, processes and platforms that allow video game assets...
A3940ac0-0757-4181-8b9d-5741f8a934fc-87e2da858ee6.small Minds and Machines
An introduction to philosophy of mind, exploring consciousness, reality, AI...

© 2013-2019