Informações sobre o curso
4.8
24 classificações
11 avaliações
100% online

100% online

Comece imediatamente e aprenda em seu próprio cronograma.
Prazos flexíveis

Prazos flexíveis

Redefinir os prazos de acordo com sua programação.
Nível iniciante

Nível iniciante

Horas para completar

Aprox. 15 horas para completar

Sugerido: 3 hours/week...
Idiomas disponíveis

Inglês

Legendas: Inglês
100% online

100% online

Comece imediatamente e aprenda em seu próprio cronograma.
Prazos flexíveis

Prazos flexíveis

Redefinir os prazos de acordo com sua programação.
Nível iniciante

Nível iniciante

Horas para completar

Aprox. 15 horas para completar

Sugerido: 3 hours/week...
Idiomas disponíveis

Inglês

Legendas: Inglês

Programa - O que você aprenderá com este curso

Semana
1
Horas para completar
3 horas para concluir

Welcome to the Management of Information Security

This module provides a welcome to the course and describes the course modules that follow. The lecture and reading will introduce you to the broad topic of security management and establish the basic terminology needed for later modules. Also, you will begin learning about the case company that you will use in an extended simulation that spans the rest of this course as you build on your learning by engaging in real world analysis and reporting on cybersecurity topics....
Reading
2 vídeos (total de (Total 8 mín.) min), 2 leituras, 2 testes
Video2 videos
Welcome to security Management5min
Reading2 leituras
What is security management?20min
Capstone Project: Getting started10min
Quiz1 exercício prático
Pretest: Test your knowledge before you begin10min
Semana
2
Horas para completar
4 horas para concluir

Governance and Strategic Planning in Information Security

In this module, you will explore how organizations organize the cybersecurity function and engage in strategic planning. This will include coverage of where the information security management team is placed in the organizational hierarchy, what functions does the CSO of an organization fulfill, as well as some explanation of the strategic planning function.You will also develop a simulated organizational plan in a report to executive management as part of the ongoing case study....
Reading
2 vídeos (total de (Total 8 mín.) min), 4 leituras, 3 testes
Video2 videos
Executive viewpoint on governance in cybersecurity3min
Reading4 leituras
How organizations structure the security function25min
What does the CSO do?20min
How organizations make strategic plans for security20min
Capstone Project: Organizing for cybersecurity10min
Quiz2 exercícios práticos
Governance and strategic planning in information security practice quiz10min
Governance and strategic planning in information security quiz10min
Semana
3
Horas para completar
4 horas para concluir

Risk Management

This module will define risk management and explore the processes used by organizations to identify and control risk. This will include basic techniques used to identify and assess risk as well as exploration of the risk control strategies that can be used to help control risk. You will also experiment with reading an industry standard risk report that you will summarize and analyze as you assess operational risk for higher management as part of the ongoing case-based project....
Reading
3 vídeos (total de (Total 11 mín.) min), 5 leituras, 3 testes
Video3 videos
The risk assessment process4min
Executive viewpoint on risk management methodology2min
Reading5 leituras
An overview of the risk management process15min
More on identifying and assessing risk15min
Determining risk control strategies15min
Methods used to implement risk management10min
Capstone Project: Identifying risks15min
Quiz2 exercícios práticos
Risk management practice quiz10min
Risk management quiz10min
Semana
4
Horas para completar
4 horas para concluir

Regulatory Compliance, Law and Ethics

In this module you will learn about how organizations must manage the complex issues emerging from the rapidly changing legal and regulatory environment. It will include a short overview of the laws and regulations you should plan to learn about as well as an introduction to how ethics is encountered in the workplace. Then you will engage on a discussion on compliance with industry standards and governmental regulation as a means to move closer to a more secure work environment. As part of the ongoing case study you will be asked to advise management on an ethical dilemma currently facing some of the management team at CHI....
Reading
2 vídeos (total de (Total 10 mín.) min), 4 leituras, 3 testes
Video2 videos
Executives viewpoint on implementing compliance programs4min
Reading4 leituras
The legal landscape of cybersecurity20min
Workplace ethics20min
Common processes in cybersecurity programs20min
Capstone Project: Ethical decision making5min
Quiz2 exercícios práticos
Regulations, law, ethics, and compliance practice quiz10min
Regulations, law, ethics, and compliance10min
4.8
11 avaliaçõesChevron Right
Benefício de carreira

17%

consegui um benefício significativo de carreira com este curso

Melhores avaliações

por MTSep 25th 2017

Great course. Provides a great hands on insight and experience with Cybersecurity

por CMar 10th 2017

Great course that provides good insights into the world of CyberSecurity!

Instrutores

Avatar

Dr. Humayun Zafar

Associate Professor of Information Security and Assurance
Information Systems
Avatar

Dr. Traci Carte

Associate Professor Chair, Information Systems
Information Systems
Avatar

Herbert J. Mattord, Ph.D., CISM, CISSP, CDP

Associate Professor in Information Security and Assurance
Information Systems
Avatar

Mr. Andy Green

Lecturer of Information Security and Assurance
Kennesaw State University - Department of Information Systems
Avatar

Michael Whitman, Ph.D., CISM, CISSP

Professor of Information Security
Information Systems

Sobre University System of Georgia

The University System of Georgia is composed of 28 higher education institutions including 4 research universities, 2 regional universities, 12 state universities, 13 state colleges and the Skidaway Institute of Oceanography. The Georgia Public Library System, encompassing 61 library systems throughout Georgia, is also part of the University System....

Sobre o Programa de cursos integrados Cybersecurity: Developing a Program for Your Business

Cybersecurity is an essential business skill for the evolving workplace. For-profit companies, government agencies, and not-for-profit organizations all need technologically proficient, business-savvy information technology security professionals. In this Specialization, you will learn about a variety of processes for protecting business assets through policy, education and training, and technology best practices. You’ll develop an awareness of the risks and cyber threats or attacks associated with modern information usage, and explore key technical and managerial topics required for a balanced approach to information protection. Topics will include mobility, the Internet of Things, the human factor, governance and management practices....
Cybersecurity: Developing a Program for Your Business

Perguntas Frequentes – FAQ

  • Ao se inscrever para um Certificado, você terá acesso a todos os vídeos, testes e tarefas de programação (se aplicável). Tarefas avaliadas pelos colegas apenas podem ser enviadas e avaliadas após o início da sessão. Caso escolha explorar o curso sem adquiri-lo, talvez você não consiga acessar certas tarefas.

  • Quando você se inscreve no curso, tem acesso a todos os cursos na Especialização e pode obter um certificado quando concluir o trabalho. Seu Certificado eletrônico será adicionado à sua página de Participações e você poderá imprimi-lo ou adicioná-lo ao seu perfil no LinkedIn. Se quiser apenas ler e assistir o conteúdo do curso, você poderá frequentá-lo como ouvinte sem custo.

Mais dúvidas? Visite o Central de Ajuda ao Aprendiz.