About the course
Despite the growing threat of cyber attacks, many organizations lack a unified and consistent strategy to avoid, mitigate, and manage cyber risks. The first part of the course examines the business case for building a cybersecurity strategy, including the resources, obstacles, and stakeholders involved. The course also considers the differences in strategy between small, resource-challenged organizations and large, resource-rich organizations. The second part of the course provides students with an introduction to the field of cybersecurity. The primary focus will be on the fundamental definitions, principles, and concepts of cyber security, including the current state of the field nationally and globally; confidentiality, integrity & availability; threat, vulnerability & risk; risk reduction, transfer, avoidance, & acceptance; deterrent, preventative, corrective, & detective controls; security models; access control; authentication and authorization; non-repudiation; defense-in-depth; security by design; and separation of privilege & duties.
Upon completion of this course, students will be able to:
- Build the business case for a cybersecurity strategy regardless of an organization’s size and resources
- Understand the key models and concepts of cybersecurity
- Approach cybersecurity issues systematically
- Articulate the tradeoffs inherent in many cybersecurity decisions
- Describe the role of the ISO
John Harmon is a Regional Sales Manager at Endgame where he leads sales and capture for the US Intelligence Community, DOD, and Federal Law Enforcement. He has spent the past 15 years in the US Intelligence Community as an SIGINT analyst, cyber capabilities developer, technical team lead in cyber...
Read more about Information Technology
Because of COVID-19, many providers are cancelling or postponing in-person programs or providing online participation options.
We are happy to help you find a suitable online alternative.