{"593715":{"#nid":"593715","#data":{"type":"event","title":"Open-Enrollment Course: \u0022Cybersecurity: A Systems Approach Core Course\u0022","body":[{"value":"\u003Cp\u003EAs many business sectors become increasingly information-centric and network-reliant, cyber security becomes a critical pillar of the enterprise. This course explores information security vulnerabilities and how to approach cyber security resilience as a complex system. Effective frameworks for assessing and managing information security within an enterprise architecture, including systems engineering, are examined. Conduct workshop exercises to practice newly learned techniques for identifying vulnerabilities, defining threats, assessing risk, and designing a security plan.\u003C\/p\u003E\r\n\r\n\u003Cp\u003E\u003Ca href=\u0022https:\/\/pe.gatech.edu\/courses\/cyber-security-systems-approach\u0022\u003Ehttps:\/\/pe.gatech.edu\/courses\/cyber-security-systems-approach\u003C\/a\u003E\u003C\/p\u003E\r\n\r\n\u003Cdiv\u003E\r\n\u003Ch2\u003EWho Should Attend\u003C\/h2\u003E\r\n\r\n\u003Cdiv\u003E\r\n\u003Cdiv\u003E\r\n\u003Cdiv\u003E\r\n\u003Cp\u003EManagers, engineers and other technical professionals with growing responsibility for cyber security design\/administration\/management or network administration, professionals in government or data-rich industries such as energy, finance, healthcare and defense whose roles are highly impacted by the security of data, professionals moving into cyber security roles\u003C\/p\u003E\r\n\u003C\/div\u003E\r\n\u003C\/div\u003E\r\n\u003C\/div\u003E\r\n\u003C\/div\u003E\r\n\r\n\u003Cdiv\u003E\r\n\u003Ch2\u003EHow You Will Benefit\u003C\/h2\u003E\r\n\r\n\u003Cdiv\u003E\r\n\u003Cdiv\u003E\r\n\u003Cdiv\u003E\r\n\u003Cul\u003E\r\n\t\u003Cli\u003EDevelop foundational knowledge of the principles of information security\u2028and the nature of cyber defense.\u003C\/li\u003E\r\n\t\u003Cli\u003EUnderstand how systems engineering processes are effectively applied to securing complex, connected systems.\u003C\/li\u003E\r\n\t\u003Cli\u003EDevelop a linkage between enterprise architecture and business processes.\u003C\/li\u003E\r\n\t\u003Cli\u003ELearn techniques for evaluating threats and risk so that you can make proactive decisions to reduce the impact of security breaches.\u003C\/li\u003E\r\n\t\u003Cli\u003EDevelop and practice your skills for assessing risk\/threats, designing a security plan and providing a path for business continuity in the event of a security incident.\u003C\/li\u003E\r\n\u003C\/ul\u003E\r\n\u003C\/div\u003E\r\n\u003C\/div\u003E\r\n\u003C\/div\u003E\r\n\u003C\/div\u003E\r\n\r\n\u003Cdiv\u003E\r\n\u003Ch2\u003EContent\u003C\/h2\u003E\r\n\r\n\u003Cdiv\u003E\r\n\u003Cdiv\u003E\r\n\u003Cdiv\u003E\r\n\u003Cul\u003E\r\n\t\u003Cli\u003E\r\n\t\u003Cp\u003EInformation security principles and the need for a systems engineering approach\u003C\/p\u003E\r\n\t\u003C\/li\u003E\r\n\t\u003Cli\u003E\r\n\t\u003Cp\u003EVulnerabilities and emerging threats\u003C\/p\u003E\r\n\t\u003C\/li\u003E\r\n\t\u003Cli\u003E\r\n\t\u003Cp\u003EMalware\u003C\/p\u003E\r\n\t\u003C\/li\u003E\r\n\t\u003Cli\u003E\r\n\t\u003Cp\u003EDefensive technologies\u003C\/p\u003E\r\n\t\u003C\/li\u003E\r\n\t\u003Cli\u003E\r\n\t\u003Cp\u003EInformation assurance standards\u003C\/p\u003E\r\n\t\u003C\/li\u003E\r\n\t\u003Cli\u003E\r\n\t\u003Cp\u003ENetwork security\u003C\/p\u003E\r\n\t\u003C\/li\u003E\r\n\t\u003Cli\u003E\r\n\t\u003Cp\u003EWeb presence and applications\u003C\/p\u003E\r\n\t\u003C\/li\u003E\r\n\t\u003Cli\u003E\r\n\t\u003Cp\u003EInsider threats\u003C\/p\u003E\r\n\t\u003C\/li\u003E\r\n\t\u003Cli\u003E\r\n\t\u003Cp\u003EAssessing and managing risk: A decision-making framework\u003C\/p\u003E\r\n\t\u003C\/li\u003E\r\n\t\u003Cli\u003E\r\n\t\u003Cp\u003EBusiness continuity and disaster recovery\u003C\/p\u003E\r\n\t\u003C\/li\u003E\r\n\t\u003Cli\u003E\r\n\t\u003Cp\u003EHands-on cyber security project\u003C\/p\u003E\r\n\t\u003C\/li\u003E\r\n\u003C\/ul\u003E\r\n\u003C\/div\u003E\r\n\u003C\/div\u003E\r\n\u003C\/div\u003E\r\n\u003C\/div\u003E\r\n\r\n\u003Cp\u003E\u0026nbsp;\u003C\/p\u003E\r\n\r\n\u003Cp\u003E\u0026nbsp;\u003C\/p\u003E\r\n","summary":null,"format":"limited_html"}],"field_subtitle":"","field_summary":[{"value":"\u003Cp\u003EBegin a cybersecurity certificate from \u003Cstrong\u003EGeorgia Tech Professional Education\u003C\/strong\u003E with this foundational course. As many business sectors become increasingly information-centric and network-reliant, cybersecurity becomes a critical pillar of the enterprise. This course explores information security vulnerabilities and how to approach cybersecurity resilience as a complex system.\u003C\/p\u003E\r\n","format":"limited_html"}],"field_summary_sentence":[{"value":"Begin a cybersecurity certificate from Georgia Tech Professional Education with this foundational course."}],"uid":"27490","created_gmt":"2017-07-25 13:32:44","changed_gmt":"2017-08-07 20:09:25","author":"Tara La Bouff","boilerplate_text":"","field_publication":"","field_article_url":"","field_event_time":{"event_time_start":"2017-08-15T01:00:00-04:00","event_time_end":"2017-08-17T01:00:00-04:00","event_time_end_last":"2017-08-17T01:00:00-04:00","gmt_time_start":"2017-08-15 05:00:00","gmt_time_end":"2017-08-17 05:00:00","gmt_time_end_last":"2017-08-17 05:00:00","rrule":null,"timezone":"America\/New_York"},"extras":[],"related_links":[{"url":"https:\/\/pe.gatech.edu\/certificates\/cyber-security-certificate","title":"Cybersecurity Certificate"},{"url":"https:\/\/pe.gatech.edu\/","title":"Georgia Tech Professional Education"}],"groups":[{"id":"430601","name":"Institute for Information Security and Privacy"}],"categories":[],"keywords":[{"id":"1404","name":"Cybersecurity"},{"id":"2662","name":"professional education"}],"core_research_areas":[],"news_room_topics":[],"event_categories":[{"id":"10377","name":"Career\/Professional development"}],"invited_audience":[{"id":"78761","name":"Faculty\/Staff"},{"id":"78771","name":"Public"},{"id":"174045","name":"Graduate students"}],"affiliations":[],"classification":[],"areas_of_expertise":[],"news_and_recent_appearances":[],"phone":[],"contact":[{"value":"\u003Cdiv\u003E\r\n\u003Cdiv\u003E\r\n\u003Cdiv\u003E\r\n\u003Cdiv\u003E\r\n\u003Cdiv\u003E\r\n\u003Ch2\u003EFor Course-Related Questions\u003C\/h2\u003E\r\n\r\n\u003Cp\u003EPlease contact the course administrator: \u003Ca href=\u0022mailto:renita.folds@gtri.gatech.edu\u0022\u003ERenita Folds\u003C\/a\u003E\u003C\/p\u003E\r\n\u003C\/div\u003E\r\n\u003C\/div\u003E\r\n\u003C\/div\u003E\r\n\u003C\/div\u003E\r\n\u003C\/div\u003E\r\n","format":"limited_html"}],"email":[],"slides":[],"orientation":[],"userdata":""}}}