Prerequisite: CMP 620. Apply critical thinking and analysis to determine potential risks to the enterprise. Investigate the application of systems, tools, and concepts to minimize risk in an organization's cyberspace initiatives. Explore how to identify threats, conduct vulnerability assessments, and perform risk assessment and management. Examine system development and application assurance from a holistic viewpoint that spans the cyberspace landscapes. Gain an understanding of the value provided by regulatory, policy, and compliance guidelines in addition to pure technology options.
After completing this course, you should be able to:
- Employ cybersecurity terminology and applied technologies in order to assess cyber management and policy needs and collaborate with stakeholders
- Apply human aspect principles to cybersecurity management and policy and design a cybersecurity strategy that aligns with the vision, mission, and goals of the organization's operational and strategic plans
- Integrate appropriate enterprise, national, and international regulatory and compliance aspects into the cybersecurity governance framework and align an organization's security posture to applicable laws, statutes, and regulatory documents
- Describe current developments in cybersecurity technologies and policies and address cyberattacks and incidents at the enterprise, national, and international levels
- Apply the systems, tools, and concepts used to minimize risks to an organization's cyberspace and prevent cybersecurity incidents