Information Security and Risk Management in Context
Barbara Endicott-Popovsky
Learn to defend and protect vital company information using the latest technology and defense strategies. Analyze internal and external threats to proactively prevent information attacks. Gain experience by solving real-world problems and leave the class equipped to establish and oversee information security.
Announcements
Keep Learning about Information Security and Risk Management
Thank you for enrolling in Information Security and Risk Management. Given your interest in this area of study, you may want to learn more about the Certificate in Information Security and Risk Managementoffered online through the University of Washington.
By enrolling in the UW certificate program, you gain access to the enhanced version of each of the courses, which includes interaction with an instructor, additional assignments, readings, and multimedia material. Plus, you earn a valuable UW credential.
There are three courses in the certificate program. The cost for each course is either $1,025 for noncredit or $2,055 for graduate credit. More pricing details are available online.
The deadline to apply for this program is 5 p.m. Pacific Daylight Time on October 8, 2012. Details on how to apply are available online. Feel free to contact a UW enrollment adviser by email at info@pce.uw.edu or by phone at 888-469-6499, if you have additional questions.
If you’re unable to commit to the full program at this time but would like to consider enrolling in the future, sign up for email notifications on the UW Certificate in Information Security and Risk Management page.
Once again, thank you for joining us in this course!
By enrolling in the UW certificate program, you gain access to the enhanced version of each of the courses, which includes interaction with an instructor, additional assignments, readings, and multimedia material. Plus, you earn a valuable UW credential.
There are three courses in the certificate program. The cost for each course is either $1,025 for noncredit or $2,055 for graduate credit. More pricing details are available online.
The deadline to apply for this program is 5 p.m. Pacific Daylight Time on October 8, 2012. Details on how to apply are available online. Feel free to contact a UW enrollment adviser by email at info@pce.uw.edu or by phone at 888-469-6499, if you have additional questions.
If you’re unable to commit to the full program at this time but would like to consider enrolling in the future, sign up for email notifications on the UW Certificate in Information Security and Risk Management page.
Once again, thank you for joining us in this course!
Thu 27 Sep 2012 4:10:00 PM PDT
Video Download
Thank you for enrolling in this free course. The University of Washington is committed to working with some of the world’s leading instructors to provide high quality, free education, globally.
We have removed the ability to download course video from Coursera for a number of reasons:
i. Our video contains functionality which only works within the Coursera environment. Downloading it to another platform, such as You Tube, prevents this from working as designed.
ii. Our ability to bring you a free course means that we must protect its content so that it is viewed as intended, as a component of an instructionally coherent educational program in Coursera.
We apologize if this is an inconvenience for some students who would prefer more flexibility for viewing this free content.
Along with the free course offering, we also provide the added opportunity for Coursera students to enroll in one of our leading Certificate programs.
We hope that you understand our need to maintain a quality standard and continue to enjoy the course.
The University of Washington
We have removed the ability to download course video from Coursera for a number of reasons:
i. Our video contains functionality which only works within the Coursera environment. Downloading it to another platform, such as You Tube, prevents this from working as designed.
ii. Our ability to bring you a free course means that we must protect its content so that it is viewed as intended, as a component of an instructionally coherent educational program in Coursera.
We apologize if this is an inconvenience for some students who would prefer more flexibility for viewing this free content.
Along with the free course offering, we also provide the added opportunity for Coursera students to enroll in one of our leading Certificate programs.
We hope that you understand our need to maintain a quality standard and continue to enjoy the course.
The University of Washington
Thu 27 Sep 2012 3:55:00 PM PDT
Welcome to Information Security and Risk Management in Context!
Thank you for joining Information Security and Risk Management in Context! Please take a few moments to read through the course welcome page and watch the welcome video. There is a lot of useful information there about the course.
For now, you should plan to allocate between five and 10 hours per week on the IRSM course. There will be roughly two hours of lectures per week, as well as weekly quizzes (graded automatically). Five of the weekly lessons will also include discussion forums in which you will respond to questions pertinent to the lectures for that week.
There is no textbook, since the course is self-contained.
My goal for you is that by the end of the course you will have a strong understanding of the need for information security programs and the ways in which they function. Again, welcome, and I hope you enjoy this course!
Dr. Barbara Endicott-Popovsky
Director, Center for Information Assurance and Cybersecurity
Academic Director, Master of Infrastructure Planning and Management
Fellow, Aberystwyth University, Wales
For now, you should plan to allocate between five and 10 hours per week on the IRSM course. There will be roughly two hours of lectures per week, as well as weekly quizzes (graded automatically). Five of the weekly lessons will also include discussion forums in which you will respond to questions pertinent to the lectures for that week.
There is no textbook, since the course is self-contained.
My goal for you is that by the end of the course you will have a strong understanding of the need for information security programs and the ways in which they function. Again, welcome, and I hope you enjoy this course!
Dr. Barbara Endicott-Popovsky
Director, Center for Information Assurance and Cybersecurity
Academic Director, Master of Infrastructure Planning and Management
Fellow, Aberystwyth University, Wales
Mon 24 Sep 2012 4:08:00 PM PDT
No comments:
Post a Comment