Information Technology
Hands on Training icon
Hands On Training
Hands on Training icon

Cybersecurity Risk Management

Course Cover
compare button icon

Course Features

icon

Duration

8 weeks

icon

Delivery Method

Online

icon

Available on

Limited Access

icon

Accessibility

Mobile, Desktop, Laptop

icon

Language

English

icon

Subtitles

English

icon

Level

Advanced

icon

Effort

12 hours per week

icon

Teaching Type

Instructor Paced

Course Description

Cybersecurity risk management guides a growing number of IT decisions. Cybersecurity risks continue to have critical impacts on overall IT risk modeling, assessment and mitigation.

In this course, you will learn about the general information security risk management framework and its practices and how to identify and model information security risks and apply both qualitative and quantitative risk assessment methods. Understanding this framework will enable you to articulate the business consequences of identified information security risks. These skills are essential for any successful information security professional.

The goal of this course is to teach students the risk management framework with both qualitative and quantitative assessment methods that concentrate on the information security (IS) aspect of IT risks. The relationship between the IT risk and business value will be discussed through several industry case studies.

First, you will learn about the principles of risk management and its three key elements: risk analysis, risk assessment and risk mitigation. You will learn to identify information security related threats, vulnerability, determine the risk level, define controls and safeguards, and conduct cost-benefit analysis or business impact analysis.

Second, we will introduce the qualitative and quantitative frameworks and discuss the differences between these two frameworks. You will learn the details of how to apply these frameworks in assessing information security risk.

Third, we will extend the quantitative framework with data mining and machine learning approaches that are applicable for data-driven risk analytics. You will explore the intersection of information security, big data and artificial intelligence.

Finally, you will analyze a series of extended case studies, which will help you to comprehend and generalize the principles, frameworks and analytical methods in actual examples.

This offering is part of the RITx Cybersecurity MicroMasters Program that prepares students to enter and advance in the field of computing security.

Course Overview

projects-img

Live Class

projects-img

Human Interaction

projects-img

Personlized Teaching

projects-img

International Faculty

projects-img

Case Based Learning

projects-img

Post Course Interactions

projects-img

Case Studies,Instructor-Moderated Discussions

Skills You Will Gain

Prerequisites/Requirements

Successful completion of CYBER501x Cybersecurity Fundamentals

What You Will Learn

Information security risk management framework and methodologies

Identifying and modeling information security risks

Qualitative and quantitative risk assessment methods

Articulating information security risks as business consequences

Course Instructors

Tong Sun

Adjunct Professor, Computing Security

Dr. Tong Sun is an adjunct professor at Department of Computer Science, Rochester Institute of Technology. She is leading data analytics research lab at PARC, Xerox Company. She received her Ph.D. in...
Course Cover