Information Security and Risk Management in Context
Description
When you enroll for courses through Coursera you get to choose for a paid plan or for a free plan .
- Free plan: No certicification and/or audit only. You will have access to all course materials except graded items.
- Paid plan: Commit to earning a Certificate—it's a trusted, shareable way to showcase your new skills.
Learn to defend and protect vital company information using the latest technology and defense strategies. Analyze internal and external threats to proactively prevent information attacks. Gain experience by solving real-world problems and leave the class equipped to establish and oversee information security.
About the Course
Explore the latest techniques for securing information and its systems, from policies and procedures to technologies and audit. Learn from leading experts who share proven practices in areas such as mobile workforce safety, security metrics, electronic evidence oversight and coping with e-crime and e-discovery. Study the protection of Cloud computing information. Disco…Frequently asked questions
There are no frequently asked questions yet. If you have any more questions or need help, contact our customer service.
When you enroll for courses through Coursera you get to choose for a paid plan or for a free plan .
- Free plan: No certicification and/or audit only. You will have access to all course materials except graded items.
- Paid plan: Commit to earning a Certificate—it's a trusted, shareable way to showcase your new skills.
Learn to defend and protect vital company information using the latest technology and defense strategies. Analyze internal and external threats to proactively prevent information attacks. Gain experience by solving real-world problems and leave the class equipped to establish and oversee information security.
About the Course
Explore the latest techniques for securing information and its systems, from policies and procedures to technologies and audit. Learn from leading experts who share proven practices in areas such as mobile workforce safety, security metrics, electronic evidence oversight and coping with e-crime and e-discovery. Study the protection of Cloud computing information. Discover how to foster the development of future information security leaders.Topics covered include:
- Information security strategies and individual privacy
- Legal security implications
- Medical health record confidentiality and integrity
- Cutting-edge technologies
About the Instructor(s)
Barbara Endicott-Popovsky Research Associate Professor, the Information School, University of Washington Director, Center for Information Assurance and Cybersecurity, University of Washington Research Associate Professor, the Information School, University of Washington PhD, Computer Science and Security, University of Idaho M.S. in Information Systems Engineering, Seattle Pacific University MBA, Business Administration, University of Washington.Barbara Endicott-Popovsky's interests include enterprise-wide information systems security and compliance management, forensic-ready networks, digital forensic science and secure coding practices. She was granted membership in the American Academy of Forensic Scientists for her work in applying archival sciences to digital forensics. In 2011, the UW won a $2.1 million federal grant to train graduate students in the burgeoning field of information assurance and cybersecurity. Endicott-Popovsky serves as the grant’s principal investigator.
Provided by:
University: University of Washington
Instructor(s): Barbara Endicott-Popovsky
Share your review
Do you have experience with this course? Submit your review and help other people make the right choice. As a thank you for your effort we will donate $1.- to Stichting Edukans.There are no frequently asked questions yet. If you have any more questions or need help, contact our customer service.