Cybersecurity Risk Management

Provided by:
6/10 stars
based on  7 reviews
Provided by:
Cost FREE
Start Date TBA

Course Details

Cost

FREE

Upcoming Schedule

  • TBA

Course Provider

edX online courses
Harvard University, the Massachusetts Institute of Technology, and the University of California, Berkeley, are just some of the schools that you have at your fingertips with edX. Through massive open online courses (MOOCs) from the world's best universities, you can develop your knowledge in literature, math, history, food and nutrition, and more. These online classes are taught by highly-regarded experts in the field. If you take a class on computer science through Harvard, you may be tau...
Harvard University, the Massachusetts Institute of Technology, and the University of California, Berkeley, are just some of the schools that you have at your fingertips with edX. Through massive open online courses (MOOCs) from the world's best universities, you can develop your knowledge in literature, math, history, food and nutrition, and more. These online classes are taught by highly-regarded experts in the field. If you take a class on computer science through Harvard, you may be taught by David J. Malan, a senior lecturer on computer science at Harvard University for the School of Engineering and Applied Sciences. But there's not just one professor - you have access to the entire teaching staff, allowing you to receive feedback on assignments straight from the experts. Pursue a Verified Certificate to document your achievements and use your coursework for job and school applications, promotions, and more. EdX also works with top universities to conduct research, allowing them to learn more about learning. Using their findings, edX is able to provide students with the best and most effective courses, constantly enhancing the student experience.

Provider Subject Specialization
Sciences & Technology
Business & Management
22610 reviews

Course Description

Cybersecurity risk management guides a growing number of IT decisions. Cybersecurity risks continue to have critical impacts on overall IT risk modeling, assessment and mitigation.

In this course, you will learn about the general information security risk management framework and its practices and how to identify and model information security risks and apply both qualitative and quantitative risk assessment methods. Understanding this framework will enable you to articulate the business consequences of identified information security risks. These skills are essential for any successful information security professional.

The goal of this course is to teach students the risk management framework with both qualitative and quantitative assessment methods that concentrate on the information security (IS) aspect of IT risks. The relationship between the IT risk and business value will be discussed through several industry case studi...

Cybersecurity risk management guides a growing number of IT decisions. Cybersecurity risks continue to have critical impacts on overall IT risk modeling, assessment and mitigation.

In this course, you will learn about the general information security risk management framework and its practices and how to identify and model information security risks and apply both qualitative and quantitative risk assessment methods. Understanding this framework will enable you to articulate the business consequences of identified information security risks. These skills are essential for any successful information security professional.

The goal of this course is to teach students the risk management framework with both qualitative and quantitative assessment methods that concentrate on the information security (IS) aspect of IT risks. The relationship between the IT risk and business value will be discussed through several industry case studies.

First, you will learn about the principles of risk management and its three key elements: risk analysis, risk assessment and risk mitigation. You will learn to identify information security related threats, vulnerability, determine the risk level, define controls and safeguards, and conduct cost-benefit analysis or business impact analysis.

Second, we will introduce the qualitative and quantitative frameworks and discuss the differences between these two frameworks. You will learn the details of how to apply these frameworks in assessing information security risk.

Third, we will extend the quantitative framework with data mining and machine learning approaches that are applicable for data-driven risk analytics. You will explore the intersection of information security, big data and artificial intelligence.

Finally, you will analyze a series of extended case studies, which will help you to comprehend and generalize the principles, frameworks and analytical methods in actual examples.

This offering is part of the RITx Cybersecurity MicroMasters Program that prepares students to enter and advance in the field of computing security.

Cybersecurity Risk Management course image
Reviews 6/10 stars
7 Reviews for Cybersecurity Risk Management

Ratings details

  • 5 stars
  • 4 stars
  • 3 stars
  • 2 stars
  • 1 stars
  • 5 stars
  • 4 stars
  • 3 stars
  • 2 stars
  • 1 stars
  • 5 stars
  • 4 stars
  • 3 stars
  • 2 stars
  • 1 stars

Rankings are based on a provider's overall CourseTalk score, which takes into account both average rating and number of ratings. Stars round to the nearest half.

Sort By
Michael Geiser profile image
Michael Geiser profile image

Michael Geiser

8/10 starsCompleted
2 years, 1 month ago
The content is good to great. Some other reviewers have **almost** valid points but overall a GREAT course and instructors. The instructors accents are no worse then people I work with and to be honest not a huge distraction to me. I would suggest that the lesson transcripts be crowd-sourced like Wikipedia; why rely only on speech to text for this important information? I am absolutely going finish the Micromasters and to move into the MS in Cybersecurity at RIT
Was this review helpful? Yes0
 Flag
Jeffry Mora profile image
Jeffry Mora profile image

Jeffry Mora

1/10 starsTaking Now
2 years, 2 months ago
Not only this course, but the whole course overall so far has let me down; I was wondering if I could get some background for my CV, all I can prove with these courses is that you do not need a University degree or a certificate to do your job better than anybody else. I have been working with big enterprises taking escalations for anti-security devices from various customers, and all I have is a high school diploma and lots of desire to learn and have taken advantage of lots of opportunities, but ever since I signed up for this course I think that I have been de-learning what it took me so hard to learn. I will finish the course, since I am half of the way done with it. Long story short, I do not have a University degree, you do not need it most of the times if you work with technology, the whole course has pour quality/content/not knowledgeable professors, as a matter of fact I wish I could be the one teaching and maybe make some m... Not only this course, but the whole course overall so far has let me down; I was wondering if I could get some background for my CV, all I can prove with these courses is that you do not need a University degree or a certificate to do your job better than anybody else. I have been working with big enterprises taking escalations for anti-security devices from various customers, and all I have is a high school diploma and lots of desire to learn and have taken advantage of lots of opportunities, but ever since I signed up for this course I think that I have been de-learning what it took me so hard to learn. I will finish the course, since I am half of the way done with it. Long story short, I do not have a University degree, you do not need it most of the times if you work with technology, the whole course has pour quality/content/not knowledgeable professors, as a matter of fact I wish I could be the one teaching and maybe make some money on the side.
Was this review helpful? Yes0
 Flag
Brigitte Van Gerven profile image
Brigitte Van Gerven profile image

Brigitte Van Gerven

2/10 starsTaking Now
2 years, 2 months ago
Not being a native english speaker and not having a background in cybersecurity, I find it difficult to follow the videos. The teacher continually mispronounces words, and leaves out definite articles and verbs from sentences. I was hoping that the videos’ transcriptions could shed some light, but they are just as bad: full of errors. I often have to listen to a video fragment multiple times before I know what the teacher is saying. It is distracting, costs extra effort, causes misunderstandings, and after watching a video I can barely remember what it was actually about. I want to put my effort in grasping the subject, not in deciphering someone’s language. Nevertheless, it is easy to get through the exams. The questions don’t test any understanding of the subject, they ask stuff that literally appeared in the videos so just look it up in the transcriptions.
Was this review helpful? Yes0
 Flag
Emily Y profile image
Emily Y profile image

Emily Y

2/10 starsTaking Now
2 years, 3 months ago
B-O-R-I-N-G. I can't stay awake during the videos. Very hard to stay interested and motivated with a slow, dull, sleepy delivery.
Was this review helpful? Yes0
 Flag
Suzan N. profile image
Suzan N. profile image

Suzan N.

10/10 starsTaking Now
2 years, 3 months ago
It is the first time I meet the topic "Risk Management". In general, I find learning different frameworks, definitions and methodologies very dry. However, I really like this course. The quality is very high. I print out the pdf files and add my own annotations because the quiz questions are very tricky. Many thanks to RIT and edX for offering this course to international students.
Was this review helpful? Yes0
 Flag
Gary S profile image
Gary S profile image

Gary S

1/10 starsDropped
2 years, 3 months ago
In Unit 1 Tong Sun made crucial mistakes: 1) ISO is not the International Standards Organization. It's the the International Organization for Standardization. ISO is not an acronym. The organization adopted ISO as its abbreviated name in reference to the Greek word isos (ἴσος, meaning equal). 2) Adversaries does not mean the same thing as threats/attacks. Adversaries are PEOPLE, and should be merged with the term actors. Furthermore, her definition of threats, attacks, and adversaries is actually the definition of RISK (and she should have said "exploit" instead of "exercise"), not threats, attacks, and adversaries! From her video: Threats, or attacks, or adversaries -- we use these three terms interchangeably in this course. They refer to the potential for threats sourced to exercise a specific vulnerability, either accidentally or intentionally. 3) Script Kiddies is not a tool. It's the people that use the tool. From her video... In Unit 1 Tong Sun made crucial mistakes: 1) ISO is not the International Standards Organization. It's the the International Organization for Standardization. ISO is not an acronym. The organization adopted ISO as its abbreviated name in reference to the Greek word isos (ἴσος, meaning equal). 2) Adversaries does not mean the same thing as threats/attacks. Adversaries are PEOPLE, and should be merged with the term actors. Furthermore, her definition of threats, attacks, and adversaries is actually the definition of RISK (and she should have said "exploit" instead of "exercise"), not threats, attacks, and adversaries! From her video: Threats, or attacks, or adversaries -- we use these three terms interchangeably in this course. They refer to the potential for threats sourced to exercise a specific vulnerability, either accidentally or intentionally. 3) Script Kiddies is not a tool. It's the people that use the tool. From her video: Fast-forward ten years in 2000's, when attack tools such as script kiddies is widely available. 4) 4) IT is not cybersecurity. IT and Cybersecurity should be thought of as two entirely different fields, much like police officers and firefighters. You wouldn’t expect a police officer to show up at a house fire alone, just like you wouldn’t expect a firefighter to show up at an armed robbery alone. Sure, both professions are there to help you out in a time of need, but their training is specific to their purpose. The same can be said about IT and Cybersecurity. There’s a lot of crossover between the two fields, but it’s two different battlefields in the same war. From her video: because the top priority of today's IT job is cybersecurity. I have ZERO confidence in learning about risk management from her after these fundamental mistakes!
Was this review helpful? Yes0
 Flag
Khalid Saminu profile image
Khalid Saminu profile image

Khalid Saminu

10/10 starsCompleted
2 years, 3 months ago
very fantastic because it will security of the order but mean of the school is respected the school because of their professional of computer science and technology
Was this review helpful? Yes0
 Flag

Rating Details


  • 5 stars
  • 4 stars
  • 3 stars
  • 2 stars
  • 1 stars
  • 5 stars
  • 4 stars
  • 3 stars
  • 2 stars
  • 1 stars
  • 5 stars
  • 4 stars
  • 3 stars
  • 2 stars
  • 1 stars

Rankings are based on a provider's overall CourseTalk score, which takes into account both average rating and number of ratings. Stars round to the nearest half.