Course Information
Description
Introduction to the principles and practices of cyber compliance. Topics include analyzing cyber compliance requirements, risk analysis and management strategies, security awareness and training development, and how to positively contribute to improved cyber compliance landscapes. Students will also develop communication skills to effectively articulate complex cyber compliance concepts to different audiences.
Total Credits
3
Course Competencies
-
Translate complex cyber compliance concepts to technical and non-technical audiencesAssessment StrategiesIllustrationQuizSkill DemonstrationSimulationTestWritten ProductCriteriaArticulate complex cyber compliance concepts verbally and in writing using principles of Plain LanguageConvert complex cyber compliance concepts to analogiesDistinguish most effective communication style for varying audiences
-
Track and manage cyber compliance improvement projectsAssessment StrategiesIllustrationQuizSkill DemonstrationSimulationTestWritten ProductCriteriaCreate visual dashboards to support the tracking and management of cyber compliance improvement projectsCommunicate effectively with leaders and subject matter experts to drive compliance improvement projectsDistinguish between organizational influence and authority
-
Apply trust principles in cyber compliance activitiesAssessment StrategiesQuizSkill DemonstrationSimulationTestWritten ProductCriteriaExamine potential conflicts of working in cyber compliance rolesProactively apply Trust Principles to positively influence compliance outcomes and professional relationshipsPractice effective application of Trust Principles in reaction to conflict
-
Compose IT policies, standards, and proceduresAssessment StrategiesQuizSkill DemonstrationSimulationTestWritten ProductCriteriaCompare components of IT policies, standards, and proceduresDifferentiate between issue-specific and system-specific policiesCompose a policy, standard, and procedure
-
Facilitate employee security awareness trainingAssessment StrategiesIllustrationQuizSkill DemonstrationSimulationTestWritten ProductCriteriaDescribe and apply components of visual communicationAnalyze security awareness training requirementsDesign and develop security awareness infographicExperience the implementation of security awareness trainingEvaluate security awareness training for effectiveness
-
Analyze cyber compliance requirementsAssessment StrategiesQuizSkill DemonstrationSimulationTestWritten ProductCriteriaExamine security controls, laws, and frameworksCorrelate security controls, laws, and frameworks to specific industriesFacilitate tailoring of security controls
-
Differentiate risk management techniquesAssessment StrategiesQuizSkill DemonstrationSimulationTestWritten ProductCriteriaArticulate risk management techniquesIdentify appropriate risk management techniques for various scenariosRecognize risk mitigation strategies
-
Support cyber compliance auditsAssessment StrategiesIllustrationQuizSkill DemonstrationSimulationTestWritten ProductCriteriaDetermine when a cyber compliance audit is requiredArticulate differences in third-party and internal auditsCommunicate advocacy for cyber compliance auditsDescribe examples of artifacts collected during a cyber compliance auditExamine results of an auditCreate visual dashboards to present audit results
-
Perform risk analysisAssessment StrategiesIllustrationQuizSkill DemonstrationSimulationTestWritten ProductCriteriaArticulate preparatory components of risk analysisInventory threats and vulnerabilitiesMeasure likelihood and impact through development and application of a risk matrixSelect qualitative or quantitative measures to effectively analyze riskCreate visual dashboards to present results of risk analysis