This course intends to make the student familiar with information security management. When you have finished with this course you will know more about:
Este curso faz parte do Programa de cursos integrados Cybersecurity: Developing a Program for Your Business
oferecido por


Informações sobre o curso
oferecido por

Sistema de Universidades da Geórgia
The University System of Georgia is composed of 28 higher education institutions including 4 research universities, 2 regional universities, 12 state universities, 13 state colleges and the Skidaway Institute of Oceanography. The Georgia Public Library System, encompassing 61 library systems throughout Georgia, is also part of the University System.
Programa - O que você aprenderá com este curso
Welcome to the Management of Information Security
This module provides a welcome to the course and describes the course modules that follow. The lecture and reading will introduce you to the broad topic of security management and establish the basic terminology needed for later modules. Also, you will begin learning about the case company that you will use in an extended simulation that spans the rest of this course as you build on your learning by engaging in real world analysis and reporting on cybersecurity topics.
Governance and Strategic Planning in Information Security
In this module, you will explore how organizations organize the cybersecurity function and engage in strategic planning. This will include coverage of where the information security management team is placed in the organizational hierarchy, what functions does the CSO of an organization fulfill, as well as some explanation of the strategic planning function.You will also develop a simulated organizational plan in a report to executive management as part of the ongoing case study.
Risk Management
This module will define risk management and explore the processes used by organizations to identify and control risk. This will include basic techniques used to identify and assess risk as well as exploration of the risk control strategies that can be used to help control risk. You will also experiment with reading an industry standard risk report that you will summarize and analyze as you assess operational risk for higher management as part of the ongoing case-based project.
Regulatory Compliance, Law and Ethics
In this module you will learn about how organizations must manage the complex issues emerging from the rapidly changing legal and regulatory environment. It will include a short overview of the laws and regulations you should plan to learn about as well as an introduction to how ethics is encountered in the workplace. Then you will engage on a discussion on compliance with industry standards and governmental regulation as a means to move closer to a more secure work environment. As part of the ongoing case study you will be asked to advise management on an ethical dilemma currently facing some of the management team at CHI.
Avaliações
- 5 stars91,66%
- 4 stars6,25%
- 1 star2,08%
Principais avaliações do THE BUSINESS OF CYBERSECURITY CAPSTONE
Great course that provides good insights into the world of Cyber-Security!
One of the Best course to know about different directions of Cyber-security. Thanks to CourseEra and the teachers.
Exxcellent material and very helpful. The only part I don't care for is relying on Peer Grading. I would much rather have an instructor view the work and provide useful feedback to me.
Great course that provides good insights into the world of CyberSecurity!
Sobre Programa de cursos integrados Cybersecurity: Developing a Program for Your Business
Cybersecurity is an essential business skill for the evolving workplace. For-profit companies, government agencies, and not-for-profit organizations all need technologically proficient, business-savvy information technology security professionals. In this Specialization, you will learn about a variety of processes for protecting business assets through policy, education and training, and technology best practices. You’ll develop an awareness of the risks and cyber threats or attacks associated with modern information usage, and explore key technical and managerial topics required for a balanced approach to information protection. Topics will include mobility, the Internet of Things, the human factor, governance and management practices.

Perguntas Frequentes – FAQ
Quando terei acesso às palestras e às tarefas?
O que recebo ao me inscrever nesta Especialização?
Existe algum auxílio financeiro disponível?
Mais dúvidas? Visite o Central de Ajuda ao estudante.