Chat is disabled at this time.

Cyber Risk to Information Technology Systems

EmailEmail      PrintPrint

Fee: $1,450.00  

Course Description

This is the second course of a series of courses designed to provide organizational leaders at various levels with sufficient knowledge and skills to drive improvements to their organization's cybersecurity capabilities. This three day course is designed for busy risk managers and other leaders who risk managers who need to understand the cyber risk to their organization's IT systems.

Topics covered in CYB602 include an overview of IT systems (hardware, software, etc.) and the various types of associated risks (operational, technical, etc.) that apply to them. In this rapidly changing field, this course is built upon the recently released National Institute of Standards (NIST) cybersecurity framework. (The NIST framework, applies across all industries and organizations, and is currently voluntary.) By completing this training course, participants will understand, value, and apply IT system components, emerging technologies, IT business service models, and how to best minimize IT management and operational risks.

Learn to:
  • Identify differences among the various components of typical IT systems
  • Identify types of operating system's vulnerabilities to specific types of cyber attacks
  • Recognize the differences between cyber attacks on operating systems versus applications
  • Identify that people are the most vulnerable aspect of a given IT system
  • Recognize common attacks on servers
  • Match emerging technologies with their potential vulnerabilities
  • Identify the relevant aspects of confidentiality, integrity and availability in a scenario
  • Evaluate whether a given system can be defined as a Trustworthy Information System
  • Define what cybersecurity controls are and how these controls are categorized
  • Categorize the control types in a given scenario
  • Apply appropriate standards to applicable controls for the system
  • Identify the management and operational risks and match the correct controls to address these risks
  • Recognize methods for evaluating technical controls
  • Identify the key elements of best practices in continuous monitoring

Materials provided include the Cyber Risk to Information Technology (IT) Systems Participant Workbook (©UTA, 2013)

Loading posts...
Sort Gallery

Arrow to top