Cybersecurity Risk Management Across Critical Systems

Instructor: Charles Harry

Skills you'll gain

  •   Cyber Security Strategy
  •   Information Assurance
  •   Risk Modeling
  •   Threat Modeling
  •   Cyber Security Policies
  •   Stakeholder Communications
  •   Security Management
  •   Risk Mitigation
  •   Cyber Security Assessment
  •   Governance
  •   Vulnerability Assessments
  •   Cybersecurity
  •   Risk Analysis
  •   Stakeholder Engagement
  •   Cyber Governance
  •   Operational Risk
  •   Risk Management
  •   Enterprise Risk Management (ERM)
  •   Cyber Attacks
  •   Cyber Risk
  • There are 6 modules in this course

    Your instructor, Dr. Charles Harry, has served on the front lines with the NSA (National Security Agency) and as an expert advising corporate and institutional leaders on managing cybersecurity risk. And he brings a rare and engaging perspective to help you learn cybersecurity from the ground up. Cybersecurity Risk Management Across Critical Systems lays the groundwork to understand and explore the key issues facing practitioners and policy makers attempting to manage the problem of cybersecurity, from its technical foundations to the domestic and international policy considerations surrounding governance, privacy, and risk management for the resiliency of critical systems, to applications for achieving the goals of an enterprise, an institution, or a nation. This course is designed for students with some or no background in information technology, whether a novice or active in the cybersecurity field (engineers and computer scientists will learn the broader context and business aspects of cybersecurity), and will provide the principles to understand the current debates shaping a rapidly evolving security landscape.

    Estimating Primary Risk (Week 2)

    Estimating Secondary Risk (Week 3)

    Estimating Second Order Risk (Week 4)

    Cyber Attack Scenarios and Generating the Risk Register (Week 5)

    Communicating and Managing Risk Effectively (Week 6)

    Explore more from Computer Security and Networks

    ©2025  ementorhub.com. All rights reserved