Cybersecurity Risk Management

Tong Sun, RITx

Learn key principles of risk analysis, risk assessment and risk mitigation for information security using both qualitative and quantitative methodologies.

Cybersecurity risk management guides a growing number of IT decisions. Cybersecurity risks continue to have critical impacts on overall IT risk modeling, assessment and mitigation.

In this course, you will learn about the general information security risk management framework and its practices and how to identify and model information security risks and apply both qualitative and quantitative risk assessment methods. Understanding this framework will enable you to articulate the business consequences of identified information security risks. These skills are essential for any successful information security professional.

The goal of this course is to teach students the risk management framework with both qualitative and quantitative assessment methods that concentrate on the information security (IS) aspect of IT risks. The relationship between the IT risk and business value will be discussed through several industry case studies.

First, you will learn about the principles of risk management and its three key elements: risk analysis, risk assessment and risk mitigation. You will learn to identify information security related threats, vulnerability, determine the risk level, define controls and safeguards, and conduct cost-benefit analysis or business impact analysis.

Second, we will introduce the qualitative and quantitative frameworks and discuss the differences between these two frameworks. You will learn the details of how to apply these frameworks in assessing information security risk.

Third, we will extend the quantitative framework with data mining and machine learning approaches that are applicable for data-driven risk analytics. You will explore the intersection of information security, big data and artificial intelligence.

Finally, you will analyze a series of extended case studies, which will help you to comprehend and generalize the principles, frameworks and analytical methods in actual examples.

This offering is part of the RITx Cybersecurity MicroMasters Program that prepares students to enter and advance in the field of computing security.

What will you learn

  • Information security risk management framework and methodologies
  • Identifying and modeling information security risks
  • Qualitative and quantitative risk assessment methods
  • Articulating information security risks as business consequences

Dates:
  • 7 January 2020
Course properties:
  • Free:
  • Paid:
  • Certificate:
  • MOOC:
  • Video:
  • Audio:
  • Email-course:
  • Language: English Gb

Reviews

No reviews yet. Want to be the first?

Register to leave a review

Show?id=n3eliycplgk&bids=695438
NVIDIA
More on this topic:
23ed8d2e-5ca3-47d4-9971-ec7749c5c18b-b11b604b74ce.small Digital Technology and Innovation
Look at digital technology and innovation from the perspective of a chief information...
Large-icon2b Designing and Executing Information Security Strategies
This course provides you with opportunities to integrate and apply your information...
Cybersecurity_378x225 Economics of Cybersecurity
Learn how to measure the costs and assess the importance of securing your business...
Computerlock-logo_2 Cybersecurity and Its Ten Domains
Learn about the ten domains of cybersecurity through the lens of subject area...
Computerlock-logo_2 Cybersecurity and Its Ten Domains
This course is designed to introduce students, working professionals and the...
More from 'Computer Science':
695ff980-b45a-425f-bee6-51bf6e962d90-de2d1a1c22e0.small Video Game Design History
Learn about the evolution of video games from experts at The Strong National...
595aa0b6-077d-439b-a651-95a9ee65c51a-fc966dc2648f.small Video Game Design and Balance
Learn about the video game design process and experiment with effective methods...
Fcd236ea-68ae-46f7-b991-849a41cebc64-0ea84acf6bad.small Video Game Asset Creation and Process
Learn about the tools, processes and platforms that allow video game assets...
Regular_7e290d30-8e84-46b2-bf50-801246fb157c Advanced Data Mining with Weka
Learn how to use popular packages that extend Weka's functionality and areas...
Regular_0b883f52-bc27-40f6-b633-d5fa9dd1101a Prepare to Run a Code Club
Build your confidence and get practical advice on launching and running a Code...
More from 'edX':
4178fda1-e8c7-476c-81e8-8a6b453a6a76-569208c21635.small Humanitarian Response to Conflict and Disaster
Learn the principles guiding humanitarian response to modern emergencies, and...
695ff980-b45a-425f-bee6-51bf6e962d90-de2d1a1c22e0.small Video Game Design History
Learn about the evolution of video games from experts at The Strong National...
595aa0b6-077d-439b-a651-95a9ee65c51a-fc966dc2648f.small Video Game Design and Balance
Learn about the video game design process and experiment with effective methods...
Fcd236ea-68ae-46f7-b991-849a41cebc64-0ea84acf6bad.small Video Game Asset Creation and Process
Learn about the tools, processes and platforms that allow video game assets...
A3940ac0-0757-4181-8b9d-5741f8a934fc-87e2da858ee6.small Minds and Machines
An introduction to philosophy of mind, exploring consciousness, reality, AI...

© 2013-2019