Designing and Executing Information Security Strategies

This course is offered through Coursera — you can add it to your Accredible profile to organize your learning, find others learning the same thing and to showcase evidence of your learning on your CV with Accredible's export features.


Course Date: 26 August 2014 to 04 November 2014 (10 weeks)

Price: free

Course Summary

This course provides you with opportunities to integrate and apply your information security knowledge.


Estimated Workload: 4-6 hours/week

Course Instructors

Mike Simon

Mike Simon is a leading expert in computer security, information assurance and security policy development. He began his career in 1985, designing and building the secure network laboratory infrastructure for research programs at the University of Idaho. As CTO for local network engineering firms, Simon has improved the security posture for hundreds of customers in a variety of industries.

Mike has been building and securing information systems professionally since the early inception of the internet and his business experience and training allow insight into organizational needs which drive information infrastructure and security design. Mike believes that the role of an information security professional is to enable organizational goals, while providing a broad understanding of information risk to policy makers, and that care must be taken not to stifle the creative process of business and operations planning.

Mike is an adjunct faculty member for the University of Washington and occasionally lectures at Seattle University, University of Idaho and several civic organizations on the subject of information assurance and computer security. He sits on the advisory board for the Information Assurance certificate program for the University of Washington Information School, the Advisory Board for the Computer Science Department at the University of Idaho and on the Founders Board for the Information School at the University of Washington.

Course Description

This course provides you with opportunities to integrate and apply your information security knowledge.

This course provides you with opportunities to integrate and apply your information security knowledge. Following the case-study approach, you will be introduced to current, real-world cases developed and presented by the practitioner community. You will design and execute information assurance strategies to solve these cases.

Topics explored include:
Analysis and problem solving using cases contracted from real world problems in Information Assurance including:

  • Selection and application of controls
  • Construction of security policies
  • Understanding and application of regulatory requirements
  • Understanding and application of business constraints 
  • Communication of risk to non-information assurance professionals
  • Identification and remediation of new threats
  • Analysis and performance of incident response
  • Communication of Information Assurance principles and concepts
  • Peer reviewed analysis of each case
  • Reading and class explanation of good and bad examples (from news and public sources)
  • Reading and peer discussion of current events in Information Assurance

Syllabus

With successful completion of the course students should be able to:
  • Describe the nature of security risk in a business and an IT context
  • Compare and apply several models for security risk assessment
  • Facilitate a risk assessment process and gain consensus on risk-based decisions
  • Incorporate risk assessment into an IT security plan

Course Workload

4-6 hours/week

Review course:

Please sign in to review this course.

Similar Courses


{{ course.name }} {{ course.name }}

{{ course.name}}

{{course.start_date | date:'MMM d'}} — {{ course.end_date | date:'MMM d'}}   ({{ course.time_until_course_starts }} ,   length: {{ course.length_in_weeks }} weeks) Self-paced — no deadlines    
${{ course.price }} p/mfree
TO-LEARN
TO-LEARN
ADDED!

REMOVE
FROM
LIST
ON PROFILE

Course Activity & Community

Be the first Accredible user to join this course!





uploaded {{ feed_item.model.caption || feed_item.model.url || feed_item.model.file_file_name }} for the course {{ feed_item.course.name }} — {{ feed_item.time_ago }}

{{ comment.user.name }} {{ comment.text | truncate: (comment.length || comment_display_length) }}   read more hide

{{ comment.time_ago }}

started the course {{ feed_item.course.name }} — {{ feed_item.time_ago }}
followed {{ feed_item.model.name }} — {{ feed_item.time_ago }}
followed thier friend {{ feed_item.model.name }} — {{ feed_item.time_ago }}
{{ feed_item.model.text }} (on the course {{ feed_item.course.name }}) — {{ feed_item.time_ago }}

{{ comment.user.name }} {{ comment.text | truncate: (comment.length || comment_display_length) }}   read more hide

{{ comment.time_ago }}