Full course description
Starts May 18, 2015
Today's fast moving information security field creates demand for industry professionals with up-to-the minute knowledge of the latest technologies, threats and remediation strategies to keep systems secure. The need has never been greater, with customer data, employee personal information, personal health information and digitized intellectual property under constant risk of cyberattack and exfiltration.
By taking this course, you will gain an overview of Information Assurance (IA) from the view of a Chief Information Security Officer (CISO)—the person in an organization ultimately responsible for keeping information secure in an organization. Students are encouraged to find topics of interest, as they study the material provided. These can lead to insights into career directions within this broad and growing field.
Information Security and Risk Management will teach you the latest management tools and approaches for securing vital organization information, preparing you to find a direction that will allow you eventually to assume information security responsibilities. You will learn what technologies and practices keep information secure, as well as how to engage the people side of information security, equipping you with the latest methods and best practices you can apply immediately at your workplace. Topics covered include:
- Information security strategies and individual privacy
- Legal security implications
- Medical health record confidentiality and integrity
- Cutting-edge technologies
Dr. Barbara Endicott-Popovsky
Director of the Center for Information Assurance and Cybersecurity
Barbara Endicott-Popovsky, Ph.D., is Director of the Center for Information Assurance and Cybersecurity, with a joint faculty appointment in the Information School and the University of Washington Institute of Technology, Tacoma, as well as an affiliate appointment in the College of Architecture/Department of Urban Design and Planning online masters program in Strategic Planning for Critical Infrastructures. Her teaching interests include information assurance, risk management for information security, computer forensics, critical infrastructure protection, software engineering, developing secure code. Her research involves developing approaches that support emerging trends in network forensic investigations, defining information system security strategies to include requirements for meeting courtroom admissibility standards, creating approaches to embed forensic capability into networks that anticipate digital evidence trends, investigation into security vulnerabilities in critical infrastructure, pedagogical approaches to teaching information system security subjects that bridge industry and the classroom.