Week 2: The Security Environment: Threats, vulnerabilities, and consequences PPT Read Rhodes-Ousley text Chapter 2
Week 3: Principles of Cybersecurity: The interrelated components of the computing environment PPT Read Rhodes-Ousley text Chapter 4
Week 4: Cybersecurity Management Concepts: Security governance and Management models, roles, and functions Read Rhodes-Ousley text Chapter 5
Week 5: Enterprise Roles and Structures: Information security roles and positions and Alternative enterprise structures and interfaces PPT Read Rhodes-Ousley text Chapter 6
Week 6: Strategy and Strategic Planning: Strategy, Strategic planning and security strategy, the information security lifecycle and Architecting the enterprise PPT Read Cyber Security Strategy
Week 10:Security Standards and Controls PPT Read Rhodes-Ousleytext Chapter 30
Week 11:Risk Management: Principles of risk, Types of risk and Risk strategies PPT Read the material Risk Management
Week 12:Security Metrics and Key Performance Indicators (KPIs): The challenge of security metrics. What makes a good metric? Approaches to security metrics PPT Read Rhodes-Ousleytext Chapter 13