Designing
and Executing Information Security Strategies
This
course provides you with opportunities to integrate and apply your information
security knowledge.
This
course provides you with opportunities to integrate and apply your information
security knowledge. Following the case-study approach, you will be introduced
to current, real-world cases developed and presented by the practitioner
community. You will design and execute information assurance strategies to
solve these cases.
Topics
explored include:
Analysis and problem solving using cases contracted from real world
problems in Information Assurance including:
·
Selection and
application of controls
·
Construction of
security policies
·
Understanding and
application of regulatory requirements
·
Understanding and
application of business constraints
·
Communication of risk
to non-information assurance professionals
·
Identification and
remediation of new threats
·
Analysis and
performance of incident response
·
Communication of
Information Assurance principles and concepts
·
Peer reviewed analysis
of each case
·
Reading and class
explanation of good and bad examples (from news and public sources)
·
Reading and peer
discussion of current events in Information Assurance
Information
Security and Risk Management in Context
December 11th
(10 weeks long)
Explore the latest techniques for securing information and
its systems, from policies and procedures to technologies and audit. Learn
from leading experts who share proven practices in areas such as mobile
workforce safety, security metrics, electronic evidence oversight and coping
with e-crime and e-discovery. Study the protection of Cloud computing
information. Discover how to foster the development of future information
security leaders.
Topics covered include:
·
Information security
strategies and individual privacy
·
Legal security
implications
·
Medical health record
confidentiality and integrity
·
Cutting-edge
technologies
Building an Information Risk Management Toolkit
December
11th (10 weeks long)
In this course, you will explore several structured, risk
management approaches that guide information security decision-making. Course
topics include: developing and maintaining risk assessments (RA); developing
and maintaining risk management plans (RM); regulatory and legal compliance
issues affecting risk plans; developing a control framework for mitigating
risks; risk transfer; business continuity and disaster recovery planning from
the information security perspective.
Consider
upgrading to an enhanced, more rigorous version of this course offered online
at the University of Washington. You’ll gain access to meaningful
interaction with instructors and additional assignments, readings and multimedia
material, as well as earn a valuable University of Washington credential.
https://www.coursera.org/courses