Cybersecurity Basics for Managers

James Madison University

James Madison University

Disclaimer

Coursalytics is an independent platform to find, compare, and book executive courses. Coursalytics is not endorsed by, sponsored by, or otherwise affiliated with any business school or university.

Full disclaimer.

Read more about Cybersecurity

The modern world of security systems is changing rapidly, and these days cybersecurity has become one of the most essential parts of protecting data s...

Read more about Information Technology

Information technology is at the heart of any process connected to utilizing computers and communication systems. It is a quite broad term that is use...

About the course

Cybersecurity Basics for Managers: A Starter Kit for Understanding How to Protect Data and Information

Are you being asked to shape how your organization protects its customer data or email systems? Are your customers relying on you to protect their payment information? Do you need a place to start learning about fundamental cybersecurity concepts?

This two-week crash course is designed for leaders, professionals, and entrepreneurs who have a limited technical background related to cybersecurity, data security, and information technology. The JMU Cybersecurity Basics for Managers noncredit certificate program is discussion-oriented and formatted for the working professional.

Participants will gain knowledge that can inform their strategies to mitigate cybersecurity risks, secure data and information, build secure infrastructure, and hire qualified personnel and vendors.

Topics Addressed

  • What is the goal of information security?
  • Who are the attackers, and what motivates them?
  • How does information relate to your organization's business priority?
  • Understand the Tradeoffs: How can we balance the probability and potential impact of events with the cost to protect against them?
  • Jargon 101: From Trojans, RATS, and NIDS to brute force, threat hunting, and blue hats, learn the terms important to the cybersecurity conversation.
  • What are the resources to explore best practices in data protection?
  • What are the major federal regulatory laws?
  • Social Engineering: How to Encourage Employees to Protect the Front Lines
  • Solutions and Snake Oil: Can we know if vendors and software will deliver on their promises?
  • Yikes! Now what? Identify considerations and approaches if data is compromised.
  • Additional resources

Experts

David Cafaro

Successful leader focused on computer and network systems security with a strong background in cloud, DevOps, architecture, and engineering. Experience with defense-in-depth and risk management consulting while maintaining technical skills. I have successfully led security and engineering project...

Cybersecurity Basics for Managers at James Madison University

This course has no confirmed dates in the future. Subscribe to be notified when it is offered.


Something went wrong. We're trying to fix this error.

Thank you

Someone from the Coursalytics team will be in touch with you soon.

Disclaimer

Coursalytics is an independent platform to find, compare, and book executive courses. Coursalytics is not endorsed by, sponsored by, or otherwise affiliated with any business school or university.

Full disclaimer.

Read more about Cybersecurity

Сybersecurity courses offer an excellent opportunity to develop the knowledge and skills necessary to implement a perfect cybersecurity strategy that will accelerate the main security protocols' efficiency. After the successful completion of cybersec...

Read more about Information Technology

A large part of the courses provides basic information so the students are not required to have any IT qualifications before enrolling. Most of the IT learning programs are also broken down into specific areas of interest, such as systems analysis, a...

Because of COVID-19, many providers are cancelling or postponing in-person programs or providing online participation options.

We are happy to help you find a suitable online alternative.