This course covers risk management principles, frameworks, and techniques that can be explicitly applied to cybersecurity. In addition, it will teach students how to identify, assess, and articulate risk and options available for treating risk and which may be most appropriate for their situation. The course provides the skills relating to threat modeling. Additionally, this course provides a set of tools, samples and techniques that can be used to successfully implement and maintain a risk management framework within an organization.
Undergraduate 132 CRs
Cynthia Brumfield and Brian Haugli, Cybersecurity Risk Management, Wiley Gerardus Blokdyk, Cybersecurity Risk Management A Complete Guide, 5STARCooks
content serial | Description |
---|---|
1 | Course Aim and Course outline. What is cybersecurity and why learn cybersecurity |
2 | What Are Controls and Why Are They Important? |
3 | What is cyber risk? |
4 | Risk management principles and frameworks |
5 | Quantitative versus Qualitative Risk Assessment |
6 | Identify, assess, and articulate risks and options available for treating risk |
7 | 7th week Assessment |
8 | Defining Information Security Metrics. |
9 | Analysis Techniques |
10 | Automating Metrics Calculations and Tools |
11 | Samples and techniques to implement risk management framework |
12 | 12th week Assessment |
13 | Tools needed to successfully maintain a risk management framework |
14 | Industry case studies |
15 | Inspection reports, Feasibility reports, Research/laboratory reports, Foundational risk management techniques and Third-party security measures |
Start your application