The website will soon adopt a new look and feel. Click here to preview this page.


Cyber Security for Managers (Online)


NEXT CLASS BEGINS:


Summer - 7/7/2014             Fall - 10/6/2014


 

Description: 

Cyber security issues are all around us and reach nearly every part of our business and work, from online banking and education to Facebook and Wi-Fi. Finally, you can get up to date on Cyber Security basics and fundamentals. Designed for non-technical managers, directors and others in the work place, you will find out about threats and vulnerabilities, safeguards, common attacks, viruses, malware and spyware, disaster recover planning, Intrusion Detection/Prevention, basic security architecture, introductory forensics, and cyber terrorism.  At the end of this course, you will have the knowledge needed to practice safer computing and safeguard your business and work information.

 
One-month; Stan Waddell, Instructor.

 Directional Arrows Course Objectives

  • To gain a fundamental knowledge of what Cyber Security is and how it applies to your daily work
  • To gain an understanding of terms commonly used in Cyber Security such as “vulnerability”
  • To know how vulnerabilities occur and how to limit your exposure to them
  • To gain a fundamental understanding of what an attack is, and how to identify and prevent them from occurring
  • To provide the fundamental skills and understanding needed to identify Cyber Security threats


Puzzle Pieces Course Outcomes

At the end of this course you will:

  • Possess a fundamental knowledge of Cyber Security 
  • Understand what a vulnerability is and how to address most common vulnerabilities
  • Know basic and fundamental risk management principles as it relates to Cyber Security
  • Have the knowledge needed to practice safer computing and safeguard your information
  • Understand basic technical controls in use today, such as firewalls and Intrusion Detection systems

outlineCourse Outline

Unit 1 - Introduction to Cyber Security
  • What does "Cyber Security" mean?
  • Brief history and evolution
  • Commonly used Cyber Security terms and their meaning
  • Cyber terrorism

Unit 2 - Threats and Vulnerabilities
  • Viruses, malware and spyware
  • Vulnerability Management 101
  • Detection and Remediation

Unit 3 - Information Assurance - Staying safe
  • Enterprise Risk Management
  • Common Attacks
  • Technical Controls
  • Firewalls and encryption

Unit 4 - Disaster Recover Planning
  • Intrusion Detection/Prevention
  • Basic security architecture
  • Introductory forensics
  • Recovering data

Question MarkAbout online learning

Online learning is a fun, enjoyable and very productive way to learn. Millions of people are learning online each year. You will engage with the instructor and other participants. You will get to know your instructor and other participants. You may make friends. 

GearsHow the Course Works

It is easy to participate in your online course. After you register, you will be given a web address to go to get into your online classroom.  You will have a password and use your email address and password to gain access.

Calendar Participate when you want

You can participate any time of day or evening. The online classroom is open 24 hours a day, 7 days a week. There are no live real-time requirements or meetings. You decide when you participate. For the best learning, participants should log into the course on 2-3 different days of the week.

ChecklistWhat you will do

  1. In the online classroom, listen to audio lectures, view slides, even take an optional quiz to test yourself.
  2. Then post comments in the online discussion with your fellow participants and the instructor.  Your instructor logs on at least once a day to answer questions and join in on the discussion.
  3. Readings are assigned for each day from the textbooks provided at registration.

  4. Participate any time of day or night. The ideal is to go online 2-3 times a day since they are week-long courses, but you decide.

Discussion Discussion

The Discussion for each Unit lasts one week. All comments are made in writing and can be made at any time of the day or night.

Your instructor will log into the Discussion area at least once a day and answer questions, make comments, and respond to comments by you and the other participants.

We encourage you to make 2-3 comments each week to maximize your learning and enjoyment of the course.

It’s easy! It’s fun.

Mac Mini Technical Requirements

  • Internet access with Internet Explorer; Firefox Mozilla; or Safari web browser.
  • Access to Flash needed for audio and slide presentations.
  • Speakers to listen to audio.


About the Instructor

Stan Waddell, is the Information Security Executive Director and Information Security Officer for the University of North Carolina at Chapel Hill. He oversees the security of the University’s electronic information, and is responsible for coordinating and ensuring that information security across the University is consistent with industry best practices and meets the University’s compliance obligations. Mr. Waddell is a Certified Information Systems Security Professional (CISSP). Formerly he served as chief information security officer for the University of Texas Southwestern Medical Center in Dallas, Texas and coordinated all information security-related activities for the Medical Center, the University and its two hospitals, Zale and St. Paul University.


Who Should Attend:

Designed for non-technical managers, directors and others in the work place, you will find out about threats and vulnerabilities, safeguards, common attacks, viruses, malware and spyware, disaster recover planning, Intrusion Detection/Prevention, basic security architecture, introductory forensics, and cyber terrorism.


 

Student Loans Now Available
Click Here to Apply!

 

‌Links

Like us on Facebook
Student Loan Options

 

Schedule:

Summer Session: 7/7/2014 - 8/1/2014
(Late Registration Deadline 7/6/2014)

Fall Session: 10/6/2014 - 10/31/2014
(Late Registration Deadline 10/5/2014)

 

 

Tuition:

One-month, $245.