Class Central is learner-supported. When you buy through links on our site, we may earn an affiliate commission.

EIT Digital

Strategic security program: Why and how?

EIT Digital via Coursera

Overview

Google, IBM & Meta Certificates — All 10,000+ Courses at 40% Off
One annual plan covers every course and certificate on Coursera. 40% off for a limited time.
Get Full Access
This course focuses on the background of approaching information security management in a systematical program, how a strategic security program is developed, how risks are evaluated, and how the program is implemented, controlled, and maintained. After passing the course, you will be able to explain why a security program is a more long-lasting approach to security management than security projects, outline the process of strategic security program development and distinguish assets to be protected as well as identify risks to assets and evaluate business impacts.

Syllabus

  • Motives behind Information Security Management
    • The first module focuses on motives behind information security management in organizations. There you will learn some central terms related to information security, and clichés, hidden dynamics and influencers, which may confuse managers and discourage managers to start taking responsibility of information security in their organization. Then we will show why it is important for senior management to take the responsibility, even if it might be difficult.
  • Strategic security program and identification of assets
    • In the second module, we will focus on the strategic security program and what it contains. Then we will review what are assets, and how can they be identified with a practical example. The idea is to understand how strategic security program is developed and how IT and knowledge assets are identified.
  • Information security risk assessment and management strategies
    • The third module concentrates on risk assessment and management strategies. First, you will learn some concepts central for risk discussion, then we will identify risks, assess them and review the well-known risk management strategies.
  • Strategic security program controls, audits and maintenance
    • In the fourth module, we will go deeper into risk management, when the information security controls are introduced as well as different control types, and how their effectiveness is assessed. Also, you will learn about the audits and maintenance of security program.

Taught by

Jonna Järveläinen and Asja Kamenica

Reviews

Start your review of Strategic security program: Why and how?

Never Stop Learning.

Get personalized course recommendations, track subjects and courses with reminders, and more.

Someone learning on their laptop while sitting on the floor.