Cybersecurity Risk Management

Tong Sun, RITx

Learn key principles of risk analysis, risk assessment and risk mitigation for information security using both qualitative and quantitative methodologies.

Cybersecurity risk management guides a growing number of IT decisions. Cybersecurity risks continue to have critical impacts on overall IT risk modeling, assessment and mitigation.

In this course, you will learn about the general information security risk management framework and its practices and how to identify and model information security risks and apply both qualitative and quantitative risk assessment methods. Understanding this framework will enable you to articulate the business consequences of identified information security risks. These skills are essential for any successful information security professional.

The goal of this course is to teach students the risk management framework with both qualitative and quantitative assessment methods that concentrate on the information security (IS) aspect of IT risks. The relationship between the IT risk and business value will be discussed through several industry case studies.

First, you will learn about the principles of risk management and its three key elements: risk analysis, risk assessment and risk mitigation. You will learn to identify information security related threats, vulnerability, determine the risk level, define controls and safeguards, and conduct cost-benefit analysis or business impact analysis.

Second, we will introduce the qualitative and quantitative frameworks and discuss the differences between these two frameworks. You will learn the details of how to apply these frameworks in assessing information security risk.

Third, we will extend the quantitative framework with data mining and machine learning approaches that are applicable for data-driven risk analytics. You will explore the intersection of information security, big data and artificial intelligence.

Finally, you will analyze a series of extended case studies, which will help you to comprehend and generalize the principles, frameworks and analytical methods in actual examples.

This offering is part of the RITx Cybersecurity MicroMasters Program that prepares students to enter and advance in the field of computing security.

What will you learn

  • Information security risk management framework and methodologies
  • Identifying and modeling information security risks
  • Qualitative and quantitative risk assessment methods
  • Articulating information security risks as business consequences

Dates:
  • 6 August 2019
Course properties:
  • Free:
  • Paid:
  • Certificate:
  • MOOC:
  • Video:
  • Audio:
  • Email-course:
  • Language: English Gb

Reviews

No reviews yet. Want to be the first?

Register to leave a review

More on this topic:
23ed8d2e-5ca3-47d4-9971-ec7749c5c18b-b11b604b74ce.small Digital Technology and Innovation
Look at digital technology and innovation from the perspective of a chief information...
Efc25613-f0ea-4423-bfcd-4d94c317f085-d26c7107a1f7.small Tech for Good: The Role of ICT in Achieving the SDGs
What opportunities and challenges do digital technologies present for the development...
Large-icon2b Designing and Executing Information Security Strategies
This course provides you with opportunities to integrate and apply your information...
Cybersecurity_378x225 Economics of Cybersecurity
Learn how to measure the costs and assess the importance of securing your business...
Computerlock-logo_2 Cybersecurity and Its Ten Domains
Learn about the ten domains of cybersecurity through the lens of subject area...
More from 'Computer Science':
910f3ce1-1ffb-4bc1-99ff-86f8d5471851-b0689ff3dc8a.small Data Structures and Software Design
Learn how to select, apply, and analyze the most appropriate data representations...
4d3258fc-bcee-4c37-bf7a-9f22524bf4a7-ee314bada985.small Human-Computer Interaction I: Fundamentals & Design Principles
Learn the principles of Human-Computer Interaction to create intuitive, usable...
7138aabb-44bc-41c1-97ec-bca2ea95f5dc-c33778a8a76f.small Human-Computer Interaction II: Cognition, Context & Culture
Get into the user’s mind and understand the role of mental models and...
8a795319-4243-4956-af0d-f23ea93d8a2a-94dacb9a8f04.small Human-Computer Interaction III: Ethics, Needfinding & Prototyping
Build on your knowledge of HCI’s core principles by learning to design...
D72cb271-b1ed-4881-bc87-dbcc16708307-f3d481dad153.small Human-Computer Interaction IV: Evaluation, Agile Methods & Beyond
Complete your understand of the design life cycle by learning to take interface...
More from 'edX':
910f3ce1-1ffb-4bc1-99ff-86f8d5471851-b0689ff3dc8a.small Data Structures and Software Design
Learn how to select, apply, and analyze the most appropriate data representations...
F8a1a729-7f5f-45d4-b131-350cd4e20fa3-a2c9fd1bb762.small 知识产权法律及实务|Big Data and Intellectual Property Law and Practice
懂得在中国如何运用和保护知识产权,为迎接知识经济时代的全球竞争做好准备。Understand how to use and protect intellectual...
4d3258fc-bcee-4c37-bf7a-9f22524bf4a7-ee314bada985.small Human-Computer Interaction I: Fundamentals & Design Principles
Learn the principles of Human-Computer Interaction to create intuitive, usable...
7138aabb-44bc-41c1-97ec-bca2ea95f5dc-c33778a8a76f.small Human-Computer Interaction II: Cognition, Context & Culture
Get into the user’s mind and understand the role of mental models and...
8a795319-4243-4956-af0d-f23ea93d8a2a-94dacb9a8f04.small Human-Computer Interaction III: Ethics, Needfinding & Prototyping
Build on your knowledge of HCI’s core principles by learning to design...

© 2013-2019