Building an Information Risk Management Toolkit

Product type

Building an Information Risk Management Toolkit

Coursera (CC)
Logo Coursera (CC)
Provider rating: starstarstarstar_halfstar_border 7.2 Coursera (CC) has an average rating of 7.2 (out of 6 reviews)

Need more information? Get more details on the site of the provider.

Description

When you enroll for courses through Coursera you get to choose for a paid plan or for a free plan

  • Free plan: No certicification and/or audit only. You will have access to all course materials except graded items.
  • Paid plan: Commit to earning a Certificate—it's a trusted, shareable way to showcase your new skills.

In this course, you will explore several structured, risk management approaches that guide information security decision-making.

About the Course

In this course, you will explore several structured, risk management approaches that guide information security decision-making. Course topics include: developing and maintaining risk assessments (RA); developing and maintaining risk management plans (RM); regulatory and legal compliance issues affecting risk plans; developing a control framework for mitigating risks; risk transfer; business continuity and disaster recovery planning from the information security perspective.

Consider upgrading to an enhanced, more rigorous version of this course o…

Read the complete description

Frequently asked questions

There are no frequently asked questions yet. If you have any more questions or need help, contact our customer service.

Didn't find what you were looking for? See also: Risk Management, Building / Construction, Governance, Retail (Management), and Project Management.

When you enroll for courses through Coursera you get to choose for a paid plan or for a free plan

  • Free plan: No certicification and/or audit only. You will have access to all course materials except graded items.
  • Paid plan: Commit to earning a Certificate—it's a trusted, shareable way to showcase your new skills.

In this course, you will explore several structured, risk management approaches that guide information security decision-making.

About the Course

In this course, you will explore several structured, risk management approaches that guide information security decision-making. Course topics include: developing and maintaining risk assessments (RA); developing and maintaining risk management plans (RM); regulatory and legal compliance issues affecting risk plans; developing a control framework for mitigating risks; risk transfer; business continuity and disaster recovery planning from the information security perspective.

Consider upgrading to an enhanced, more rigorous version of this course offered online at the University of Washington. You’ll gain access to meaningful interaction with instructors and additional assignments, readings and multimedia material, as well as earn a valuable University of Washington credential.

About the Instructor(s)

Barbara Endicott-Popovsky is the Director for the Center of Information Assurance and Cybersecurity at the University of Washington, designated by the NSA/DHS as a Center for Academic Excellence in Information Assurance Education and Research. She holds a joint faculty appointment with the Information School and the School of Urban Design and Planning--Critical Infrastructure, following a 20-year industry career marked by executive and consulting positions in IT architecture and project management. Her research interests fall under the umbrella of managing/mitigating network risks: deception, governance and network forensic readiness.

Provided by:

University: University of Washington

Instructor(s): Barbara Endicott-Popovsky

There are no reviews yet.

Share your review

Do you have experience with this course? Submit your review and help other people make the right choice. As a thank you for your effort we will donate $1.- to Stichting Edukans.

There are no frequently asked questions yet. If you have any more questions or need help, contact our customer service.