a

 

15.- CURSOS UNIVERSITARIOS, ONLINE Y GRATUITOS QUE INICIAN EN DICIEMBRE

 

 

C:\Users\SEbas\Desktop\shutterstock_1225449911.jpg

 

 

Designing and Executing Information Security Strategies

December 11th (10 weeks long)

About the Course:

This course provides you with opportunities to integrate and apply your information security knowledge.

This course provides you with opportunities to integrate and apply your information security knowledge. Following the case-study approach, you will be introduced to current, real-world cases developed and presented by the practitioner community. You will design and execute information assurance strategies to solve these cases.

Topics explored include: 
Analysis and problem solving using cases contracted from real world problems in Information Assurance including:

·                     Selection and application of controls

·                     Construction of security policies

·                     Understanding and application of regulatory requirements

·                     Understanding and application of business constraints 

·                     Communication of risk to non-information assurance professionals

·                     Identification and remediation of new threats

·                     Analysis and performance of incident response

·                     Communication of Information Assurance principles and concepts

·                     Peer reviewed analysis of each case

·                     Reading and class explanation of good and bad examples (from news and public sources)

·                     Reading and peer discussion of current events in Information Assurance

 

 

 

 

 

 

 

 

Information Security and Risk Management in Context

 

December 11th (10 weeks long)

About the Course:

Explore the latest techniques for securing information and its systems, from policies and procedures to technologies and audit. Learn from leading experts who share proven practices in areas such as mobile workforce safety, security metrics, electronic evidence oversight and coping with e-crime and e-discovery. Study the protection of Cloud computing information. Discover how to foster the development of future information security leaders.

Topics covered include:

·                     Information security strategies and individual privacy

·                     Legal security implications

·                     Medical health record confidentiality and integrity

·                     Cutting-edge technologies

 

 

Building an Information Risk Management Toolkit

December 11th (10 weeks long)

About the Course:

In this course, you will explore several structured, risk management approaches that guide information security decision-making. Course topics include: developing and maintaining risk assessments (RA); developing and maintaining risk management plans (RM); regulatory and legal compliance issues affecting risk plans; developing a control framework for mitigating risks; risk transfer; business continuity and disaster recovery planning from the information security perspective.

Consider upgrading to an enhanced, more rigorous version of this course offered online at the University of Washington. You’ll gain access to meaningful interaction with instructors and additional assignments, readings and multimedia material, as well as earn a valuable University of Washington credential.

 

https://www.coursera.org/courses