Moocable is learner-supported. When you buy through links on our site, we may earn an affiliate commission.

Designing and Executing Information Security Strategies

Description

This course provides you with opportunities to integrate and apply your information security knowledge.

This course provides you with opportunities to integrate and apply your information security knowledge. Following the case-study approach, you will be introduced to current, real-world cases developed and presented by the practitioner community. You will design and execute information assurance strategies to solve these cases.

Topics explored include:
Analysis and problem solving using cases contracted from real world problems in Information Assurance including:

  • Selection and application of controls
  • Construction of security policies
  • Understanding and application of regulatory requirements
  • Understanding and application of business constraints 
  • Communication of risk to non-information assurance professionals
  • Identification and remediation of new threats
  • Analysis and performance of incident response
  • Communication of Information Assurance principles and concepts
  • Peer reviewed analysis of each case
  • Reading and class explanation of good and bad examples (from news and public sources)
  • Reading and peer discussion of current events in Information Assurance

Tags

Syllabus

With successful completion of the course students should be able to:
  • Describe the nature of security risk in a business and an IT context
  • Compare and apply several models for security risk assessment
  • Facilitate a risk assessment process and gain consensus on risk-based decisions
  • Incorporate risk assessment into an IT security plan

Online Course


Designing and Executing Information Security Strategies

Affiliate notice

This course provides you with opportunities to integrate and apply your information security knowledge.

This course provides you with opportunities to integrate and apply your information security knowledge. Following the case-study approach, you will be introduced to current, real-world cases developed and presented by the practitioner community. You will design and execute information assurance strategies to solve these cases.

Topics explored include:
Analysis and problem solving using cases contracted from real world problems in Information Assurance including:

  • Selection and application of controls
  • Construction of security policies
  • Understanding and application of regulatory requirements
  • Understanding and application of business constraints 
  • Communication of risk to non-information assurance professionals
  • Identification and remediation of new threats
  • Analysis and performance of incident response
  • Communication of Information Assurance principles and concepts
  • Peer reviewed analysis of each case
  • Reading and class explanation of good and bad examples (from news and public sources)
  • Reading and peer discussion of current events in Information Assurance

With successful completion of the course students should be able to:
  • Describe the nature of security risk in a business and an IT context
  • Compare and apply several models for security risk assessment
  • Facilitate a risk assessment process and gain consensus on risk-based decisions
  • Incorporate risk assessment into an IT security plan