Cybersecurity Risk Management
Rochester Institute of Technology
  • Start Date: 26 Sep, 2017
  • Self-Paced
  • Study Content: Videos


Learn key principles of risk analysis, risk assessment and risk mitigation for information security.

Course Fee: Free
Certificate Cost: 150.00 USD

Course Description

This course is made available through the eLearnAfrica and Edx partnership.

Cybersecurity risk management guides a growing number of IT decisions. Cybersecurity risks continue to have critical impacts on overall IT risk modeling, assessment and mitigation.


In this course, you will learn about the general information security risk management framework and its practices and how to identify and model information security risks and apply both qualitative and quantitative risk assessment methods. Understanding this framework will enable you to articulate the business consequences of identified information security risks. These skills are essential for any successful information security professional.


The goal of this course is to teach students the risk management framework with both qualitative and quantitative assessment methods that concentrate on the information security (IS) aspect of IT risks. The relationship between the IT risk and business value will be discussed through several industry case studies.


First, you will learn about the principles of risk management and its three key elements: risk analysis, risk assessment and risk mitigation. You will learn to identify information security related threats, vulnerability, determine the risk level, define controls and safeguards, and conduct cost-benefit analysis or business impact analysis.


Second, we will introduce the qualitative and quantitative frameworks and discuss the differences between these two frameworks. You will learn the details of how to apply these frameworks in assessing information security risk.


Third, we will extend the quantitative framework with data mining and machine learning approaches that are applicable for data-driven risk analytics. You will explore the intersection of information security, big data and artificial intelligence.


Finally, you will analyze a series of extended case studies, which will help you to comprehend and generalize the principles, frameworks and analytical methods in actual examples.


This offering is part of the RITx Cybersecurity MicroMasters Program that prepares students to enter and advance in the field of computing security.

Certificate cost may vary. You will be redirected to the host page for cost and payment options.

Getting Started

edX Basics

Certificates

MicroMasters

Account

The Courses

Financial Assistance

For more information, please visit the edX FAQ page.

Rochester Institute of Technology

Rochester Institute of Technology is home to leading creators, entrepreneurs, innovators and researchers. Founded in 1829, RIT enrolls more than 18,600 students in more than 200 career-oriented and professional programs, making it among the largest private universities in the U.S.

 

RIT’s nine colleges emphasize career education and experiential learning with programs that are internationally recognized and ranked for academic leadership in business, computing, engineering, imaging science, liberal arts, sustainability, and fine and applied arts. RIT also offers unparalleled support services for more than 1,200 deaf and hard-of-hearing students. The cooperative education program is one of the oldest and largest in the nation. The university’s main campus occupies 1,300 acres in suburban Rochester, N.Y. and its global partnerships include campuses in Croatia, Dubai and Kosovo.

This institution is available on eLearnAfrica through partnership with Edx.

You may be able to download course materials after enrolling in this course. If not, all of the necessary course materials provided by the course instructor will be available on the provider's course page.
COLLABORATION POLICY

By enrolling in a course on or through eLearnAfrica, you are joining a special worldwide community of learners. The aspiration of eLearnAfrica is to provide anyone with an internet connection access to courses from the best universities and institutions in the world and to provide our learners the best educational experience internet technology enables. You are a part of the community that will help eLearnAfrica achieve this goal. eLearnAfrica depends upon your motivation to learn the material and to do so with honesty and academic integrity. In order to participate in eLearnAfrica, you must agree to the Honor Code below and any additional terms specific to a class.

ELEARNAFRICA HONOR CODE PLEDGE

By enrolling in a course, program, or degree hosted on the eLearnAfrica App or Site, I agree that I will:

  • Complete all tests and assignments on my own, unless collaboration on an assignment is explicitly permitted.

  • Maintain only one user account and not let anyone else use my username and/or password.

  • Not engage in any activity that would dishonestly improve my results, or improve or hurt the results of others.

  • Not post answers to problems that are being used to assess student performance.

  • Abide by any and all requirements of the eLearnAfrica Participants as may regard the expectations of civil or academic behavior or of community standards.

VIOLATIONS

If you are found in violation of the Terms and Conditions or Honor Code, you may be subject to one or more of the following actions:

  • Receiving a zero or no credit for an assignment;

  • Having any certificate earned in the course withheld or revoked;

  • Being unenrolled from a course, learning program or degree program; or

  • Termination of your use of the App and/or Site.

  • Additional actions may be taken at the sole discretion of eLearnAfrica and eLearnAfrica course providers. 

No refunds will be issued in the case of any corrective action for such violations.

Honor code violations will be determined at the sole discretion of eLearnAfrica, the Partners, or Members. You will be notified if a determination has been made that you have violated this honor code and you will be informed of the corresponding action to be taken as a result of the violation.

CHANGING THE HONOR CODE

Please note that we review and may make changes to this Honor Code from time to time. Any changes to this Honor Code will be effective immediately upon posting on this page, with an updated effective date. By accessing the App and/or Site after any changes have been made, you signify your agreement on a prospective basis to the modified Honor Code and any changes contained therein. Be sure to return to this page periodically to ensure familiarity with the most current version of this Honor Code.

Effective Date: September 22, 2016