Об этом курсе
4.7
Оценки: 22
Рецензии: 10
This course intends to make the student familiar with information security management. When you have finished with this course you will know more about: • Governance: including the mission, roles and responsibilities of the InfoSec governance function, and the strategic planning process and InfoSec’s role in the organization’s strategic planning effort. • You will understand the various types of InfoSec policies and how effective information security policy is created and used. • Risk management and the risk management process • Certain laws and ethical issues impacting information security in the organization. And some common information security management practices such as benchmarking and performance measures....
Globe

Только онлайн-курсы

Начните сейчас и учитесь по собственному графику.
Calendar

Гибкие сроки

Назначьте сроки сдачи в соответствии со своим графиком.
Beginner Level

Начальный уровень

Clock

Предполагаемая нагрузка: 3 hours/week

Прибл. 15 ч. на завершение
Comment Dots

English

Субтитры: English
Globe

Только онлайн-курсы

Начните сейчас и учитесь по собственному графику.
Calendar

Гибкие сроки

Назначьте сроки сдачи в соответствии со своим графиком.
Beginner Level

Начальный уровень

Clock

Предполагаемая нагрузка: 3 hours/week

Прибл. 15 ч. на завершение
Comment Dots

English

Субтитры: English

Программа курса: что вы изучите

1

Раздел
Clock
3 ч. на завершение

Welcome to the Management of Information Security

This module provides a welcome to the course and describes the course modules that follow. The lecture and reading will introduce you to the broad topic of security management and establish the basic terminology needed for later modules. Also, you will begin learning about the case company that you will use in an extended simulation that spans the rest of this course as you build on your learning by engaging in real world analysis and reporting on cybersecurity topics....
Reading
2 видео (всего 8 мин.), 2 материалов для самостоятельного изучения, 2 тестов
Video2 видео
Welcome to security Management5мин
Reading2 материала для самостоятельного изучения
What is security management?20мин
Capstone Project: Getting started10мин
Quiz1 практическое упражнение
Pretest: Test your knowledge before you begin10мин

2

Раздел
Clock
4 ч. на завершение

Governance and Strategic Planning in Information Security

In this module, you will explore how organizations organize the cybersecurity function and engage in strategic planning. This will include coverage of where the information security management team is placed in the organizational hierarchy, what functions does the CSO of an organization fulfill, as well as some explanation of the strategic planning function.You will also develop a simulated organizational plan in a report to executive management as part of the ongoing case study....
Reading
2 видео (всего 8 мин.), 4 материалов для самостоятельного изучения, 3 тестов
Video2 видео
Executive viewpoint on governance in cybersecurity3мин
Reading4 материала для самостоятельного изучения
How organizations structure the security function25мин
What does the CSO do?20мин
How organizations make strategic plans for security20мин
Capstone Project: Organizing for cybersecurity10мин
Quiz2 практического упражнения
Governance and strategic planning in information security practice quiz10мин
Governance and strategic planning in information security quiz10мин

3

Раздел
Clock
4 ч. на завершение

Risk Management

This module will define risk management and explore the processes used by organizations to identify and control risk. This will include basic techniques used to identify and assess risk as well as exploration of the risk control strategies that can be used to help control risk. You will also experiment with reading an industry standard risk report that you will summarize and analyze as you assess operational risk for higher management as part of the ongoing case-based project....
Reading
3 видео (всего 11 мин.), 5 материалов для самостоятельного изучения, 3 тестов
Video3 видео
The risk assessment process4мин
Executive viewpoint on risk management methodology2мин
Reading5 материала для самостоятельного изучения
An overview of the risk management process15мин
More on identifying and assessing risk15мин
Determining risk control strategies15мин
Methods used to implement risk management10мин
Capstone Project: Identifying risks15мин
Quiz2 практического упражнения
Risk management practice quiz10мин
Risk management quiz10мин

4

Раздел
Clock
4 ч. на завершение

Regulatory Compliance, Law and Ethics

In this module you will learn about how organizations must manage the complex issues emerging from the rapidly changing legal and regulatory environment. It will include a short overview of the laws and regulations you should plan to learn about as well as an introduction to how ethics is encountered in the workplace. Then you will engage on a discussion on compliance with industry standards and governmental regulation as a means to move closer to a more secure work environment. As part of the ongoing case study you will be asked to advise management on an ethical dilemma currently facing some of the management team at CHI....
Reading
2 видео (всего 10 мин.), 4 материалов для самостоятельного изучения, 3 тестов
Video2 видео
Executives viewpoint on implementing compliance programs4мин
Reading4 материала для самостоятельного изучения
The legal landscape of cybersecurity20мин
Workplace ethics20мин
Common processes in cybersecurity programs20мин
Capstone Project: Ethical decision making5мин
Quiz2 практического упражнения
Regulations, law, ethics, and compliance practice quiz10мин
Regulations, law, ethics, and compliance10мин
4.7
Briefcase

83%

получил значимые преимущества в карьере благодаря этому курсу

Лучшие рецензии

автор: MTSep 25th 2017

Great course. Provides a great hands on insight and experience with Cybersecurity

автор: CMar 10th 2017

Great course that provides good insights into the world of CyberSecurity!

Преподавателя

Dr. Humayun Zafar

Associate Professor of Information Security and Assurance
Information Systems

Dr. Traci Carte

Associate Professor Chair, Information Systems
Information Systems

Herbert J. Mattord, Ph.D., CISM, CISSP, CDP

Associate Professor in Information Security and Assurance
Information Systems

Mr. Andy Green

Lecturer of Information Security and Assurance
Kennesaw State University - Department of Information Systems

Michael Whitman, Ph.D., CISM, CISSP

Professor of Information Security
Information Systems

О University System of Georgia

The University System of Georgia is composed of 28 higher education institutions including 4 research universities, 2 regional universities, 12 state universities, 13 state colleges and the Skidaway Institute of Oceanography. The Georgia Public Library System, encompassing 61 library systems throughout Georgia, is also part of the University System....

О специализации ''Cybersecurity: Developing a Program for Your Business'

Cybersecurity is an essential business skill for the evolving workplace. For-profit companies, government agencies, and not-for-profit organizations all need technologically proficient, business-savvy information technology security professionals. In this Specialization, you will learn about a variety of processes for protecting business assets through policy, education and training, and technology best practices. You’ll develop an awareness of the risks and cyber threats or attacks associated with modern information usage, and explore key technical and managerial topics required for a balanced approach to information protection. Topics will include mobility, the Internet of Things, the human factor, governance and management practices....
Cybersecurity: Developing a Program for Your Business

Часто задаваемые вопросы

  • Once you enroll for a Certificate, you’ll have access to all videos, quizzes, and programming assignments (if applicable). Peer review assignments can only be submitted and reviewed once your session has begun. If you choose to explore the course without purchasing, you may not be able to access certain assignments.

  • When you enroll in the course, you get access to all of the courses in the Specialization, and you earn a certificate when you complete the work. Your electronic Certificate will be added to your Accomplishments page - from there, you can print your Certificate or add it to your LinkedIn profile. If you only want to read and view the course content, you can audit the course for free.

Остались вопросы? Посетите Центр поддержки учащихся.