Cybersecurity risk management guides a growing number of IT decisions. Cybersecurity risks continue to have critical impacts on overall IT risk modeling, assessment and mitigation.
In this course, you will learn about the general information security risk management framework and its practices and how to identify and model information security risks and apply both qualitative and quantitative risk assessment methods. Understanding this framework will enable you to articulate the business consequences of identified information security risks. These skills are essential for any successful information security professional.
Individual course: $150
Course duration: 8 weeks
Time commitment: 10-12 hours each week
Experience level: Advanced
Learning partner: Rochester Institute of Technology (RITX)
The goal of this course is to teach students the risk management framework with both qualitative and quantitative assessment methods that concentrate on the information security (IS) aspect of IT risks. The relationship between the IT risk and business value will be discussed through several industry case studies.
First, you will learn about the principles of risk management and its three key elements: risk analysis, risk assessment, and risk mitigation. You will learn to identify information security related threats and vulnerability, determine the risk level, define controls and safeguards, and conduct cost-benefit analyses and business impact analyses.
Second, you will be introduced to the qualitative and quantitative frameworks and the differences between these two frameworks. You will also learn the details of how to apply these frameworks in assessing information security risk.
Third, the course will extend the quantitative framework with data mining and machine learning approaches that are applicable for data-driven risk analytics. You will explore the intersection of information security, big data, and artificial intelligence.
Finally, you will analyze a series of extended case studies, which will help you to comprehend and generalize the principles, frameworks, and analytical methods in actual examples.
This offering is part of the RITx Cybersecurity MicroMasters® program that prepares students to enter and advance in the field of computing security.
Topics of study
Information security risk management framework and methodologies
Identifying and modeling information security risks
Qualitative and quantitative risk assessment methods
Articulating information security risks as business consequences
Successful completion of Cybersecurity Fundamentals
Who can take this course?
Unfortunately, learners from the following countries or regions will not be able to register for this course: Iran, Cuba, and the Crimea region of Ukraine. While edX has sought licenses from the U.S. Office of Foreign Assets Control (OFAC) to offer their courses to learners in these countries and regions, the licenses they have received are not broad enough to allow them to offer this course in all locations. EdX truly regrets that U.S. sanctions prevent them from offering all of their courses to everyone, no matter where they live.
About the Rochester Institute of Technology (RIT)
Rochester Institute of Technology is home to leading creators, entrepreneurs, innovators, and researchers. Founded in 1829, RIT enrolls more than 18,600 students in more than 200 career-oriented and professional programs, making it among the largest private universities in the U.S.
RIT’s nine colleges emphasize career education and experiential learning with programs that are internationally recognized and ranked for academic leadership in business, computing, engineering, imaging science, liberal arts, sustainability, and fine and applied arts. RIT also offers unparalleled support services for more than 1,200 deaf and hard-of-hearing students.
The cooperative education program is one of the oldest and largest in the nation. The university’s main campus occupies 1,300 acres in suburban Rochester, New York, and its global partnerships include campuses in Croatia, Dubai, and Kosovo.