Building an Information Risk Management Toolkit
Description
When you enroll for courses through Coursera you get to choose for a paid plan or for a free plan .
- Free plan: No certicification and/or audit only. You will have access to all course materials except graded items.
- Paid plan: Commit to earning a Certificate—it's a trusted, shareable way to showcase your new skills.
In this course, you will explore several structured, risk management approaches that guide information security decision-making.
About the Course
In this course, you will explore several structured, risk management approaches that guide information security decision-making. Course topics include: developing and maintaining risk assessments (RA); developing and maintaining risk management plans (RM); regulatory and legal compliance issues affecting risk plans; developing a control framework for mitigating risks; risk transfer; business continuity and disaster recovery planning from the information security perspective.Consider upgrading to an enhanced, more rigorous version of this course o…
Frequently asked questions
There are no frequently asked questions yet. If you have any more questions or need help, contact our customer service.
When you enroll for courses through Coursera you get to choose for a paid plan or for a free plan .
- Free plan: No certicification and/or audit only. You will have access to all course materials except graded items.
- Paid plan: Commit to earning a Certificate—it's a trusted, shareable way to showcase your new skills.
In this course, you will explore several structured, risk management approaches that guide information security decision-making.
About the Course
In this course, you will explore several structured, risk management approaches that guide information security decision-making. Course topics include: developing and maintaining risk assessments (RA); developing and maintaining risk management plans (RM); regulatory and legal compliance issues affecting risk plans; developing a control framework for mitigating risks; risk transfer; business continuity and disaster recovery planning from the information security perspective.Consider upgrading to an enhanced, more rigorous version of this course offered online at the University of Washington. You’ll gain access to meaningful interaction with instructors and additional assignments, readings and multimedia material, as well as earn a valuable University of Washington credential.
About the Instructor(s)
Barbara Endicott-Popovsky is the Director for the Center of Information Assurance and Cybersecurity at the University of Washington, designated by the NSA/DHS as a Center for Academic Excellence in Information Assurance Education and Research. She holds a joint faculty appointment with the Information School and the School of Urban Design and Planning--Critical Infrastructure, following a 20-year industry career marked by executive and consulting positions in IT architecture and project management. Her research interests fall under the umbrella of managing/mitigating network risks: deception, governance and network forensic readiness.Provided by:
University: University of Washington
Instructor(s): Barbara Endicott-Popovsky
Share your review
Do you have experience with this course? Submit your review and help other people make the right choice. As a thank you for your effort we will donate $1.- to Stichting Edukans.There are no frequently asked questions yet. If you have any more questions or need help, contact our customer service.