COURSE DESCRIPTION
Develop & implement Risk Management Agility and Resilience in your organization’s IT security strategy. Review IT security basics, it’s relation to compliance, and become familiar with the Risk Management Framework, using open source tools, enabling the comprehension of different types of attacks and key concepts related to risks. Identify key organizational security needs and become familiar with international law relating to cybercrime via interactive presentations, case studies, and demonstrations.
DESCRIPTION DU COURS
Développer et mettre en œuvre une stratégie de gestion des risques intégrant Agilité et résilience dans la sécurité informatique de votre organisation en employant des outils open source. Voir les bases de la sécurité informatique, son rapport à la conformité, et se familiariser avec le cadre de la gestion des risques en utilisant des outils open source, permettant la compréhension de différents types d’attaques et de concepts clés liés aux risques. Identifier les principaux besoins de sécurité organisationnelle et se familiariser avec le droit international propre à la cybercriminalité en bénéficiant de présentations interactives, d’études de cas et de démonstrations.
Links to resources for presentations or summaries:
Risk in Review 2016 study. Report download: PwC
Winning with Risk Management – Google Play
Software-defined Networking (SDN)
2017 cybercrime trends: Expect a fresh wave of ransomware and IoT hacks – TechRepublic
News/Foresight
What is FRCP Rule 41? – Definition from WhatIs.com
Risk & Repeat: Will Rule 41 changes become cybersecurity law?
What is acceptable use policy (AUP)? – Definition from WhatIs.com
Personal security and Privacy
Cyber Security Minute | NEWS10 ABC
How to Anonymize Everything You Do Online | WIRED
Hacker Lexicon: What Is Perfect Forward Secrecy? | WIRED
Wanna Protect Your Online Privacy? Open a Tab and Make Some Noise | WIRED
Sécurité des systèmes d’information : de la gestion des risques à la confiance numérique — ÉcoGest
From Big Data to Big Profits, Success with Data and Analytics – Google Play
Frameworks
The steps to effective cybersecurity incident response
Tabletop cybersecurity exercises essential to infosec training
A framework for evaluating cloud computing risk
Technical Communities Overview – Open Networking Foundation
What is ITSM (IT Service Management)? – Definition from WhatIs.com
What is security information and event management (SIEM)? – Definition from WhatIs.com
What is security information management (SIM)? – Definition from WhatIs.com
Web application and API security trends and threats – O’Reilly Media
Deep web
Deep Web Research and Discovery Resources 2017 – LLRX
Deep Web | Deep Web Search – A How-To Site
What is Tor browser? – Definition from WhatIs.com
Special: Seek and Ye Shall Find
Deep Web Research and Discovery Resources 2016
What is darknet? – Definition from WhatIs.com
Everything you need to know about the Deep Web in one simple infographic
How to Find and Harvest Dark Web Data from the TOR Network – BrightPlanet
Deep Web and Big Data Archives – BrightPlanet
An Up-To-Date Layman’s Guide To Accessing The Deep Web | Fast Company
The AlphaBay Takedown Sends Dark Web Markets Reeling | WIRED
Monitoring
What is shadow IT (shadow information technology)? – Definition from WhatIs.com
What is cloud access security broker (CASB)? – Definition from WhatIs.com
Case studies
Inside the Hunt for Russia’s Most Notorious Hacker | WIRED
Did the Russians “hack” the election? A look at the established facts | Ars Technica
The Perfect Weapon: How Russian Cyberpower Invaded the U.S. – The New York Times
SecIndus-Etude_de_cas.v0.1.indd
Inside the OPM Hack, The Cyberattack that Shocked the US Government | WIRED
What’s Up With The Internet Today? Websites Lag, Don’t Load For Many In U.S. : The Two-Way : NPR
Course Features
- Lecture 0
- Quiz 0
- Duration 28 hours
- Skill level All levels
- Language English / French
- Students 0
- Assessments Yes