Friday, January 11, 2013

Open Course Ware @ FIX University newsRus.com


Information Security and Risk Management in Context

Barbara Endicott-Popovsky

Learn to defend and protect vital company information using the latest technology and defense strategies. Analyze internal and external threats to proactively prevent information attacks. Gain experience by solving real-world problems and leave the class equipped to establish and oversee information security.



Barbara Endicott-Popovsky
University of Washington

Announcements

Optional Textbooks and Reference Materials for ISRM

If you choose to investigate the subject of this course in more depth, I suggest three excellent textbooks. Note that these texts are optional. However, Schroeder's The Lure will be one of the readings for Week 2, so I recommend you purchase at least this book. 

  • Schroeder, S. (2012). The Lure. Boston, MA: Course Technology. ISBN: 13-978-1-4354-5712-6

  • Mather, Kumaraswamy, Latif. (2009). Cloud Security and Privacy: An Enterprise Perspective. Sebastopol, CA: O’Reilly Media, Inc. ISBN: 978-0-596-80276-9

  • Calder, A. and Watkins, S. (2008). IT Governance: A Manager’s Guide to Data Security and ISO27001/ISO27002, 4th ed. London: Kogan Page. ISBN: 978-0-7494-5271-1


In addition, I suggest as a reference book
  • Gregory, P. (2010). CISSP Guide to Security Essentials. Boston, MA: Course Technology. ISBN 13: 978-1-435-42819-5


Another useful text is 
  • Tipton, Harold, and Steven Hernandez. (2009). Official (ISC)2 Guide to the CISSP CBK, 2nd ed. Auerbach Publications. ISBN 13: 978-1439809594


Dr. Barbara Endicott-Popovsky
Director, Center for Information Assurance and Cybersecurity
Academic Director, Master of Infrastructure Planning and Management
Fellow, Aberystwyth University, Wales
Wed 9 Jan 2013 12:00 AM PST

Learn More About Information Security and Risk Management

Thank you for enrolling in Building an Information Risk Management Toolkit. Given your interest in this area of study, you may be interested in upgrading to an enhanced, more rigorous version of this course offered online at the University of Washington.

The enhancements include interaction with an instructor, additional assignments, readings, and multimedia material. Plus, you earn a valuable UW credential.

The cost the course is either $1,025 for noncredit or $2,055 for graduate credit. More pricing details are available online.

The deadline to apply for this course is 5 p.m. Pacific Daylight Time on January 23, 2013. Details onhow to apply are available online. Feel free to contact a UW enrollment adviser by email atinfo@pce.uw.edu or by phone at 888-469-6499, if you have additional questions. 

Once again, thank you for joining us in this course!
Mon 7 Jan 2013 12:00 PM PST

Welcome to Information Security and Risk Management in Context!

Thank you for joining Information Security and Risk Management in Context! Please take a few moments to read through the course welcome page and watch the welcome video. There is a lot of useful information there about the course. 

For now, you should plan to allocate between five and 10 hours per week on the IRSM course. There will be roughly two hours of lectures per week, as well as weekly quizzes (graded automatically). Five of the weekly lessons will also include discussion forums in which you will respond to questions pertinent to the lectures for that week.

There is no textbook, since the course is self-contained.

My goal for you is that by the end of the course you will have a strong understanding of the need for information security programs and the ways in which they function. Again, welcome, and I hope you enjoy this course!

Dr. Barbara Endicott-Popovsky
Director, Center for Information Assurance and Cybersecurity
Academic Director, Master of Infrastructure Planning and Management
Fellow, Aberystwyth University, Wales
Mon 7 Jan 2013 12:00 AM PST 

No comments:

Post a Comment

Followers

Blog Archive

Powered by Blogger.