MyPage is a personalized page based on your interests.The page is customized to help you to find content that matters you the most.

I'm not curious

Designing and Executing Information Security Strategies

Course Summary

This course provides you with opportunities to integrate and apply your information security knowledge.

  • +

    Course Syllabus

    With successful completion of the course students should be able to:

    • Describe the nature of security risk in a business and an IT context
    • Compare and apply several models for security risk assessment
    • Facilitate a risk assessment process and gain consensus on risk-based decisions
    • Incorporate risk assessment into an IT security plan

  • +

    Recommended Background

    • Ability to analyze cyber security threats and vulnerabilities in the context of an organization
    • Ability to analyze cyber security policies, plans and procedures
    • Understanding of the organizational governance principles in cybersecurity
    • Understanding of privacy, accountability and ethical behavior as it applies to cybersecurity.
    • Understanding of formal models for information security 
    • General knowledge of risk management frameworks

Course Fee:

Course Type:


Course Status:



1 - 4 hours / week

This course is listed under Data & Information Management and IT Security & Architecture Community

Attended this course?

Back to Top

Awards & Accolades for MyTechLogy
Winner of
Top 100 Asia
Finalist at SiTF Awards 2014 under the category Best Social & Community Product
Finalist at HR Vendor of the Year 2015 Awards under the category Best Learning Management System
Finalist at HR Vendor of the Year 2015 Awards under the category Best Talent Management Software
Hidden Image Url

Back to Top