- Course type: Self-paced
- Available Lessons: 68
- Average Lesson Length: 8 min
Eligible for Certificate:
Certificates show that you have completed the course. They do not provide credit.
Watch a preview:chapter 1 / lesson 1What is Cybersecurity? - Definition & Principles
Course SummaryIf you're studying for a test or working on assignments that cover cybersecurity policies and management, this Computer Science 332 course can help strengthen your knowledge. Explore fun lessons and take quizzes and exams to enhance your performance at school or work in a short amount of time. This Study.com course was last updated in 2018.
To Start This Course Today
Try it risk-free for 30 days
11 chapters in Computer Science 332: Cybersecurity Policies and Management
Course Practice TestCheck your knowledge of this course with a 50-question practice test.
- Comprehensive test covering all topics
- Detailed video explanations for wrong answers
About This Course
This Computer Science 332 course is designed to help you learn about or gain a better understanding of cybersecurity policies and management. Our instructors set a goal of helping you grasp how to identify and assess various cyber threats to an enterprise, develop an information security strategy and differentiate between information security models. Lessons in this course also explain how to create a security policy and appraise the performance of an existing cybersecurity plan. You'll get a comprehensive intro to cybersecurity and learn about data access control, the cybersecurity threat landscape and more. We make it easy to check and confirm your knowledge of these concepts with multiple-choice quizzes, chapter exams and a final course exam. You can also reach out to subject-matter experts to clarify topics presented in this course.
Students, professionals, educators and even casual learners can benefit from this engaging course. Students can use the lessons, quizzes and exams to learn all about cybersecurity policies and management to prepare for tests or assignments or earn higher overall grades. Professionals can use this course to brush up on concepts that can help them excel in their careers. Educators can include the materials in their curriculum as primary or supplemental learning materials. Casual learners who are interested in learning about cybersecurity policies and management can study whenever it's convenient, thanks to this course's self-paced format.
|Intro to Cybersecurity||Defines cybersecurity, information security and Internet security. Discusses the importance of information security and security focus areas.|
|The Cybersecurity Threat Landscape||Lists types of cybersecurity vulnerabilities, and explains how human error leads to digital attacks. Describes attacks, espionage and vandalism in digital crime.|
|Information Security Policy||Provides descriptions of information security policy, security policy, remote access policy, data center security and the cybersecurity team. Discusses how to create an acceptable use policy for IT resources and the effect of business impact analysis on contingency planning.|
|Information Security Strategy Development||Covers information security models, information security strategy development, security SWOT analysis and how to engage stakeholders in security strategy development and management.|
|Cybersecurity Policy, Governance & Management||Describes privacy protection, the HIPAA privacy rule, the Sarbanes-Oxley Act and the Government Information Security Reform Act of 2000. Shares facts about maintaining the confidentiality of student records, the roles and responsibilities of a cybersecurity policy development team and role of HIPAA and PHI when using technology.|
|Cybersecurity Risk Management||Teaches about risk management for information technology, the system analysis and design life cycle and significance of FIPS Publication 199 and 200. Differentiates between risk analysis and risk management in business, and discusses key controls in cybersecurity risk management.|
|Data Access Control||Discusses data sensitivity and criticality, types of access control, the purpose of security zones and uses of cryptography.|
|Partner & Vendor Security Management||Offers an overview of information security agreements, data breach notification laws, the Foreign Corrupt Practices Act and third party security reviews.|
|Security Awareness Training||Discusses organizational security awareness training, security awareness training for different audiences and cybersecurity policy and security awareness training for technical staff and management.|
|Information Security Compliance||Defines compliance, internal and informational technology audits. Describes how to publish an information security compliance policy and deploy information security compliance processes.|
|Information Security Performance Metrics||Explains information security metrics, the history of the ISO/IEC 27004, different KPIs and types of benchmarking. Lists steps for building a security metrics program.|
Earning College Credit
Did you know… We have over 160 college courses that prepare you to earn credit by exam that is accepted by over 1,500 colleges and universities. You can test out of the first two years of college and save thousands off your degree. Anyone can earn credit-by-exam regardless of age or education level.
To learn more, visit our Earning Credit Page
Transferring credit to the school of your choice
Not sure what college you want to attend yet? Study.com has thousands of articles about every imaginable degree, area of study and career path that can help you find the school that's right for you.
Research Schools, Degrees & Careers
Get the unbiased info you need to find the right school.
Browse Articles By Category
Browse an area of study or degree level.
- Biological and Biomedical Sciences
- Communications and Journalism
- Computer Sciences
- Culinary Arts and Personal Services
- Liberal Arts and Humanities
- Mechanic and Repair Technologies
- Medical and Health Professions
- Physical Sciences
- Transportation and Distribution
- Visual and Performing Arts
- Study.com Updates
- Computer Science Schools in Alabama with Course Overviews
- Computer Science Courses in Utah with School Overviews
- Online Computer Science Courses, Classes and Schools
- How Can I Use Study.com Courses to Homeschool?
- Computer Science Courses in North Carolina with School Overviews
- Computer Science Schools in Aurora with Degree and Course Info
- Computer Science Schools in Fort Worth, TX with Course Summaries
- Computer Management Course and Class Descriptions
- Computer Courses: Common Adult School Courses in Computers
- Answers and detailed explanations to each question
- Video lessons to explain complicated concepts
Explore our library of over 75,000 lessons
- College Courses
- High School Courses
- Other Courses