Cybersecurity Risk Management

Tong Sun, RITx

Learn key principles of risk analysis, risk assessment and risk mitigation for information security using both qualitative and quantitative methodologies.

Cybersecurity risk management guides a growing number of IT decisions. Cybersecurity risks continue to have critical impacts on overall IT risk modeling, assessment and mitigation.

In this course, you will learn about the general information security risk management framework and its practices and how to identify and model information security risks and apply both qualitative and quantitative risk assessment methods. Understanding this framework will enable you to articulate the business consequences of identified information security risks. These skills are essential for any successful information security professional.

The goal of this course is to teach students the risk management framework with both qualitative and quantitative assessment methods that concentrate on the information security (IS) aspect of IT risks. The relationship between the IT risk and business value will be discussed through several industry case studies.

First, you will learn about the principles of risk management and its three key elements: risk analysis, risk assessment and risk mitigation. You will learn to identify information security related threats, vulnerability, determine the risk level, define controls and safeguards, and conduct cost-benefit analysis or business impact analysis.

Second, we will introduce the qualitative and quantitative frameworks and discuss the differences between these two frameworks. You will learn the details of how to apply these frameworks in assessing information security risk.

Third, we will extend the quantitative framework with data mining and machine learning approaches that are applicable for data-driven risk analytics. You will explore the intersection of information security, big data and artificial intelligence.

Finally, you will analyze a series of extended case studies, which will help you to comprehend and generalize the principles, frameworks and analytical methods in actual examples.

This offering is part of the RITx Cybersecurity MicroMasters Program that prepares students to enter and advance in the field of computing security.

What will you learn

  • Information security risk management framework and methodologies
  • Identifying and modeling information security risks
  • Qualitative and quantitative risk assessment methods
  • Articulating information security risks as business consequences

Dates:
  • 24 March 2020
Course properties:
  • Free:
  • Paid:
  • Certificate:
  • MOOC:
  • Video:
  • Audio:
  • Email-course:
  • Language: English Gb

Reviews

No reviews yet. Want to be the first?

Register to leave a review

Show?id=n3eliycplgk&bids=695438
NVIDIA
More on this topic:
23ed8d2e-5ca3-47d4-9971-ec7749c5c18b-b11b604b74ce.small Digital Technology and Innovation
Look at digital technology and innovation from the perspective of a chief information...
Large-icon2b Designing and Executing Information Security Strategies
This course provides you with opportunities to integrate and apply your information...
Cybersecurity_378x225 Economics of Cybersecurity
Learn how to measure the costs and assess the importance of securing your business...
Computerlock-logo_2 Cybersecurity and Its Ten Domains
Learn about the ten domains of cybersecurity through the lens of subject area...
Computerlock-logo_2 Cybersecurity and Its Ten Domains
This course is designed to introduce students, working professionals and the...
More from 'Computer Science':
D4h-cover-flat-dclogo Design for Hackers
Design for Hackers is a book that teaches the principles of good visual design...
5a631d1c-cb20-4cfc-9b49-1cc9c8fc981e-5949e438d0ed.small Introduction to Linux
Never learned Linux? Want a refresh? Develop a good working knowledge of Linux...
2e052f23-9b7b-4081-808d-3fa3e87e652b-21a3bf7e7907.small 数据结构与算法设计(下) | Data Structures and Algorithm Design Part II
Learn the basics of data structures and methods to design algorithms and analyze...
354f926d-f2fe-40d5-94e9-c5b9a2c2c088-6ccbff1f45d4.small 数据结构与算法设计(上) | Data Structures and Algorithm Design Part I
Learn the basics of data structures and methods to design algorithms and analyze...
Bd426e10-8994-45bc-859f-c4259ff7a9e9-214b2fe72799.small 数据挖掘:理论与算法 | Data Mining: Theories and Algorithms for Tackling Big Data
Unraveling the mysteries of Data Mining and Big Data, this course is a must...
More from 'edX':
5a631d1c-cb20-4cfc-9b49-1cc9c8fc981e-5949e438d0ed.small Introduction to Linux
Never learned Linux? Want a refresh? Develop a good working knowledge of Linux...
5efe7b5c-18f6-400c-9564-5ff7b520b2a8-a05b06b3aa6c.small 生活英语听说 | Conversational English Skills
Learn how to effectively communicate in English and improve your conversational...
3d5b33d7-448c-4057-a824-048ed13fd8f6-cbb1a987ce32.small 文物精品与文化中国:天文与医药 | Relics of Chinese History - Part 2: Astronomy and Medicine
Discover how Astronomy and Medicine impacted the history of China as we use...
77f224a0-c43a-4669-bb46-93648612d0a3-fff6ddd97136.small 文物精品与文化中国:文字与乐礼 | Relics of Chinese History - Part 3: Writing System, Rites and Music
Discover how writing systems and music played a major role in Chinese history...
0eec8a3f-2175-4800-b076-fba0e5349c65-f6048c117265.small 文物精品与文化中国:农业与制造业 | Relics in Chinese History - Part 1: Agriculture and Manufacturing
Discover manufacturing and agriculture’s role in the history of China as we...

© 2013-2019