In this course, students will learn how organizations recognize, evaluate, and manage cybersecurity threats to safeguard vital resources and maintain operational resilience. You will explore how to evaluate threats, vulnerabilities, and potential impacts on business functions, and understand the strategies used to mitigate, transfer, accept, or avoid risks.
Students will gain practical knowledge of risk management processes, including conducting Business Impact Analysis (BIA) to determine mission-critical functions, recovery objectives, and tolerable downtime. You will also learn how to evaluate and select vendors, assess their security posture, and establish legal agreements that define responsibilities, expectations, and compliance requirements.
The course covers attestation and assessment methods, combining internal and external evaluations to verify that controls are effective and aligned with industry standards. Students will also explore penetration testing techniques to simulate real-world attacks, identify vulnerabilities, and evaluate both technical and physical security controls.