
Continuing and Professional Education
Risk Communications (coming soon)
Course Description
Learn how risk management is a fundamental function of information security, how to communicate its importance to a client organization, how to determine what metrics are most important to individual organizations, and use a real-life example pulled from the experience of Cybersecurity Education Consortium director Kim Jones to understand how these fundamentals are put into action by cybersecurity professionals.
Security Technologies
Course Description
Security Technologies is one piece of the ‘how to be a cyber security analyst’ puzzle. This course was originally created as a part of a semester-long course called ‘Security Operations’ and is intended to help the student better understand what various security technologies are common in business environments and how to make the best use of them as a part of working in a Security Operations Center (SOC). This material will help any facet of the cyber security profession (audit, governance, compliance, engineering, architecture) to better understand security technologies.
Understanding Data Sources
Course Description
Understanding Data Sources is one piece of the ‘how to be a cyber security analyst’ puzzle. This course was originally created as a part of a semester long course called ‘Security Operations’ and is intended to help the student better understand where security data originates from and how to make the best use of it as a part of working in a Security Operations Center (SOC). This material will help any facet of the cyber security profession (audit, governance, compliance, engineering, architecture) to better understand security data.