- Course type: Self-paced
- Available Lessons: 91
- Average Lesson Length: 8 min
Eligible for Certificate:
Certificates show that you have completed the course. They do not provide credit.
Watch a preview:chapter 1 / lesson 1What is Information Security? - Definition & Best Practices
Course SummaryTake Computer Science 331 to learn about the foundations of cybersecurity risk analysis management. This convenient study guide course contains simple and expertly taught lessons that can help you get ahead in your college coursework, improve your grades and study for upcoming exams.
To Start This Course Today
Try it free for 5 days
13 chapters in Computer Science 331: Cybersecurity Risk Analysis Management
Course Practice TestCheck your knowledge of this course with a 50-question practice test.
- Comprehensive test covering all topics
- Detailed video explanations for wrong answers
About This Course
In this comprehensive online course, you'll get an overview of cybersecurity risk analysis management. Taught by expert computer science instructors, this course breaks down the purposes and applications of cybersecurity threats, policies, programs, risks, safeguards, incident responses, contingency planning and much more. The course's simple and engaging lessons also explore different types of information security management methods and models.
The course is available online 24/7, and it's designed to benefit a variety of learners. Students can use the course to complement their existing class materials, and the lessons can function as effective test preparation resources. Teachers can implement the lessons in their computer science curricula, and working professionals can use the course to learn new computer concepts. In addition to the lessons, the course comes equipped with brief assessments that make it easy to reinforce the elements of cybersecurity risk analysis.
|Information Security Management||Explain the fundamentals of information security; compare types of information security; describe basic information security management principles.|
|Information Security Threats||Define the term 'threat' as it applies to information security; identify types of information security threats and digital crimes; explain how human error leads to digital attacks.|
|Cybersecurity Threats||Define the concept of cybersecurity and identify cyber threats and vulnerabilities.|
|Computer Security Laws||Name and describe laws and regulations related to computer and information security.|
|Strategic Planning & Governance||Develop a strategic plan for security and describe governance frameworks, standards and practices.|
|Cybersecurity Policies||Define security policy and explain its function in a successful information security program; describe the three major types of security policies and discuss the major components of each.|
|Cybersecurity Program Development & Implementation||Describe the process for developing and implementing security education and organizational cybersecurity programs; identify roles and responsibilities of cybersecurity team members; recognize certification options.|
|Security Management Models & Practices||Evaluate several information security models and control frameworks; understand the best practices for performance measurement.|
|Identifying & Assessing Cybersecurity Risks||Assess methods for identifying and assessing cybersecurity risk.|
|Controlling Cybersecurity Risk||Explain how to maintain and perpetuate risk controls; describe popular strategies used in the industry to manage risk.|
|Cybersecurity Safeguards||Identify and describe a range of cybersecurity safeguards and protection mechanisms.|
|Incident Response in Cybersecurity||Outline a variety of forensic methods, as well as the best practices for detecting, analyzing and removing malware, mobile malware and viruses.|
|Cybersecurity Contingency Planning||Explain the need for contingency planning and describe the development and implementation of security plans.|
Earning College Credit
Did you know… We have over 160 college courses that prepare you to earn credit by exam that is accepted by over 1,500 colleges and universities. You can test out of the first two years of college and save thousands off your degree. Anyone can earn credit-by-exam regardless of age or education level.
To learn more, visit our Earning Credit Page
Transferring credit to the school of your choice
Not sure what college you want to attend yet? Study.com has thousands of articles about every imaginable degree, area of study and career path that can help you find the school that's right for you.
Research Schools, Degrees & Careers
Get the unbiased info you need to find the right school.
Browse Articles By Category
Browse an area of study or degree level.
- Biological and Biomedical Sciences
- Communications and Journalism
- Computer Sciences
- Culinary Arts and Personal Services
- Liberal Arts and Humanities
- Mechanic and Repair Technologies
- Medical and Health Professions
- Physical Sciences
- Transportation and Distribution
- Visual and Performing Arts
- How Study.com Helps You Improve Your Grades
- Illustration Courses and Illustration Studies Coursework Info
- Studying 101: Guide to Studying in College
- What Classes Will a Computer Studies Major Take?
- 20 Web Apps to Help You Learn More and Study Less
- Can Short Video Lessons Help Your ADHD Child Study Better?
- Online Classes Helped ME Get Ahead in College
- Top AP Exam Study Guides and Resources
- Equine Science Courses by Distance Learning with Coursework Info
- How to Study Smart for Community College Courses
- Answers and detailed explanations to each question
- Video lessons to explain complicated concepts
Explore our library of over 75,000 lessons
- College Courses
- High School Courses
- Other Courses