10151107Cyber Compliance Fundamentals
Course Information
Description
Introduction to the principles and practices of cyber compliance. Topics include analyzing cyber compliance requirements, risk analysis and management strategies, security awareness and training development, and how to positively contribute to improved cyber compliance landscapes. Students will also develop communication skills to effectively articulate complex cyber compliance concepts to different audiences.
Total Credits
3

Course Competencies
  1. Translate complex cyber compliance concepts to technical and non-technical audiences
    Assessment Strategies
    Illustration
    Quiz
    Skill Demonstration
    Simulation
    Test
    Written Product
    Criteria
    Articulate complex cyber compliance concepts verbally and in writing using principles of Plain Language
    Convert complex cyber compliance concepts to analogies
    Distinguish most effective communication style for varying audiences

  2. Track and manage cyber compliance improvement projects
    Assessment Strategies
    Illustration
    Quiz
    Skill Demonstration
    Simulation
    Test
    Written Product
    Criteria
    Create visual dashboards to support the tracking and management of cyber compliance improvement projects
    Communicate effectively with leaders and subject matter experts to drive compliance improvement projects
    Distinguish between organizational influence and authority

  3. Apply trust principles in cyber compliance activities
    Assessment Strategies
    Quiz
    Skill Demonstration
    Simulation
    Test
    Written Product
    Criteria
    Examine potential conflicts of working in cyber compliance roles
    Proactively apply Trust Principles to positively influence compliance outcomes and professional relationships
    Practice effective application of Trust Principles in reaction to conflict

  4. Compose IT policies, standards, and procedures
    Assessment Strategies
    Quiz
    Skill Demonstration
    Simulation
    Test
    Written Product
    Criteria
    Compare components of IT policies, standards, and procedures
    Differentiate between issue-specific and system-specific policies
    Compose a policy, standard, and procedure

  5. Facilitate employee security awareness training
    Assessment Strategies
    Illustration
    Quiz
    Skill Demonstration
    Simulation
    Test
    Written Product
    Criteria
    Describe and apply components of visual communication
    Analyze security awareness training requirements
    Design and develop security awareness infographic
    Experience the implementation of security awareness training
    Evaluate security awareness training for effectiveness

  6. Analyze cyber compliance requirements
    Assessment Strategies
    Quiz
    Skill Demonstration
    Simulation
    Test
    Written Product
    Criteria
    Examine security controls, laws, and frameworks
    Correlate security controls, laws, and frameworks to specific industries
    Facilitate tailoring of security controls

  7. Differentiate risk management techniques
    Assessment Strategies
    Quiz
    Skill Demonstration
    Simulation
    Test
    Written Product
    Criteria
    Articulate risk management techniques
    Identify appropriate risk management techniques for various scenarios
    Recognize risk mitigation strategies

  8. Support cyber compliance audits
    Assessment Strategies
    Illustration
    Quiz
    Skill Demonstration
    Simulation
    Test
    Written Product
    Criteria
    Determine when a cyber compliance audit is required
    Articulate differences in third-party and internal audits
    Communicate advocacy for cyber compliance audits
    Describe examples of artifacts collected during a cyber compliance audit
    Examine results of an audit
    Create visual dashboards to present audit results

  9. Perform risk analysis
    Assessment Strategies
    Illustration
    Quiz
    Skill Demonstration
    Simulation
    Test
    Written Product
    Criteria
    Articulate preparatory components of risk analysis
    Inventory threats and vulnerabilities
    Measure likelihood and impact through development and application of a risk matrix
    Select qualitative or quantitative measures to effectively analyze risk
    Create visual dashboards to present results of risk analysis