Acerca de este Curso
20,186 vistas recientes

100 % en línea

Comienza de inmediato y aprende a tu propio ritmo.

Fechas límite flexibles

Restablece las fechas límite en función de tus horarios.

Nivel principiante

Aprox. 15 horas para completar

Sugerido: 3 hours/week...

Inglés (English)

Subtítulos: Inglés (English)

100 % en línea

Comienza de inmediato y aprende a tu propio ritmo.

Fechas límite flexibles

Restablece las fechas límite en función de tus horarios.

Nivel principiante

Aprox. 15 horas para completar

Sugerido: 3 hours/week...

Inglés (English)

Subtítulos: Inglés (English)

Programa - Qué aprenderás en este curso

Semana
1
3 horas para completar

Welcome to the Management of Information Security

2 videos (Total 8 minutos), 2 lecturas, 2 cuestionarios
2 videos
Welcome to security Management5m
2 lecturas
What is security management?20m
Capstone Project: Getting started10m
1 ejercicio de práctica
Pretest: Test your knowledge before you begin10m
Semana
2
4 horas para completar

Governance and Strategic Planning in Information Security

2 videos (Total 8 minutos), 4 lecturas, 3 cuestionarios
2 videos
Executive viewpoint on governance in cybersecurity3m
4 lecturas
How organizations structure the security function25m
What does the CSO do?20m
How organizations make strategic plans for security20m
Capstone Project: Organizing for cybersecurity10m
2 ejercicios de práctica
Governance and strategic planning in information security practice quiz10m
Governance and strategic planning in information security quiz10m
Semana
3
4 horas para completar

Risk Management

3 videos (Total 11 minutos), 5 lecturas, 3 cuestionarios
3 videos
The risk assessment process4m
Executive viewpoint on risk management methodology2m
5 lecturas
An overview of the risk management process15m
More on identifying and assessing risk15m
Determining risk control strategies15m
Methods used to implement risk management10m
Capstone Project: Identifying risks15m
2 ejercicios de práctica
Risk management practice quiz10m
Risk management quiz10m
Semana
4
4 horas para completar

Regulatory Compliance, Law and Ethics

2 videos (Total 10 minutos), 4 lecturas, 3 cuestionarios
2 videos
Executives viewpoint on implementing compliance programs4m
4 lecturas
The legal landscape of cybersecurity20m
Workplace ethics20m
Common processes in cybersecurity programs20m
Capstone Project: Ethical decision making5m
2 ejercicios de práctica
Regulations, law, ethics, and compliance practice quiz10m
Regulations, law, ethics, and compliance10m
4.8
11 revisionesChevron Right

17%

consiguió un beneficio tangible en su carrera profesional gracias a este curso

Principales revisiones sobre The Business of Cybersecurity Capstone

por MTSep 25th 2017

Great course. Provides a great hands on insight and experience with Cybersecurity

por CMar 10th 2017

Great course that provides good insights into the world of CyberSecurity!

Instructores

Avatar

Dr. Humayun Zafar

Associate Professor of Information Security and Assurance
Information Systems
Avatar

Dr. Traci Carte

Associate Professor Chair, Information Systems
Information Systems
Avatar

Herbert J. Mattord, Ph.D., CISM, CISSP, CDP

Associate Professor in Information Security and Assurance
Information Systems
Avatar

Mr. Andy Green

Lecturer of Information Security and Assurance
Kennesaw State University - Department of Information Systems
Avatar

Michael Whitman, Ph.D., CISM, CISSP

Professor of Information Security
Information Systems

Acerca de Sistema Universitario de Georgia

The University System of Georgia is composed of 28 higher education institutions including 4 research universities, 2 regional universities, 12 state universities, 13 state colleges and the Skidaway Institute of Oceanography. The Georgia Public Library System, encompassing 61 library systems throughout Georgia, is also part of the University System....

Acerca de Programa especializado Cybersecurity: Developing a Program for Your Business

Cybersecurity is an essential business skill for the evolving workplace. For-profit companies, government agencies, and not-for-profit organizations all need technologically proficient, business-savvy information technology security professionals. In this Specialization, you will learn about a variety of processes for protecting business assets through policy, education and training, and technology best practices. You’ll develop an awareness of the risks and cyber threats or attacks associated with modern information usage, and explore key technical and managerial topics required for a balanced approach to information protection. Topics will include mobility, the Internet of Things, the human factor, governance and management practices....
Cybersecurity: Developing a Program for Your Business

Preguntas Frecuentes

  • Una vez que te inscribes para obtener un Certificado, tendrás acceso a todos los videos, cuestionarios y tareas de programación (si corresponde). Las tareas calificadas por compañeros solo pueden enviarse y revisarse una vez que haya comenzado tu sesión. Si eliges explorar el curso sin comprarlo, es posible que no puedas acceder a determinadas tareas.

  • Cuando te inscribes en un curso, obtienes acceso a todos los cursos que forman parte del Programa especializado y te darán un Certificado cuando completes el trabajo. Se añadirá tu Certificado electrónico a la página Logros. Desde allí, puedes imprimir tu Certificado o añadirlo a tu perfil de LinkedIn. Si solo quieres leer y visualizar el contenido del curso, puedes auditar el curso sin costo.

¿Tienes más preguntas? Visita el Centro de Ayuda al Alumno.