• General

    Cyber Risk Management
    Key Highlights
    • Name: Cyber Risk Management
    • Credits: 3
    • Faculty: Dr.B.Muthukumaran
    • Mode: Online / Classroom
    • Level: Beginner / Intermediate
    • Medium: English.
    • Resources: Case Studies and Assignments
    • Prerequisite: Basic knowledge of Computer and statistics


  • Program Outline

    Effective information security at the enterprise level requires participation, planning, and practice. It is an ongoing effort that requires management and staff to work together from the same script. Fortunately, the information security community has developed a variety of resources, methods, and best practices to help modern enterprises address the challenge. Unfortunately, employing these tools demands a high degree of commitment, understanding, and skill—attributes that must be sustained through constant awareness and training. Cybersecurity risks continue to have critical impacts on overall IT risk modeling, assessment and mitigation.

    In this course, you will learn about the general information security risk management framework and its practices and how to identify and model information security risks and apply both qualitative and quantitative risk assessment methods. You will learn about the principles of risk management and its three key elements: risk analysis, risk assessment and risk mitigation. You will learn to identify information security related threats, vulnerability, determine the risk level, define controls and safeguards, and conduct cost-benefit analysis or business impact analysis.

    This course is a part of Professional Diploma in cyber investigation and law affiliated to Hindustan University. Please more information refer here. This is also offered as a stand alone course for highly focused aspirants.

    Mode of delivery:

    The course is offered as a full time course course as a part of University offering. It is also offered as online program.The course is offered in English.

    Code of conduct

    Ethical behavior is an important part of this course. Since some of the methods, codes and tools that will be discussed and experimented in the course can be very harmful, if abused, it is expected that students will behave in a responsible manner. In particular, always ask your local site administrator for permission before experimenting with security-related tools. In-class discussions of techniques for exploiting potential security threats and risks do not imply to use them! You will be sole responsible for any such violation.

    Why certify?

    Certification represents a mark of achievement and indicates that the individual has attained the required knowledge through personal study, classroom work, or laboratory applications and has passed a requisite examination of sufficient difficulty to thoroughly assess depth of knowledge. To many, the certification represents a milestone in an individual’s career. It illustrates diligence, hard work, and a strong desire for self-improvement.  The importance of a certification is a reflection of the esteem and recognition of the institution or organization granting the certification. Hiring officials must recognize the certification as a representation of diligence and hard work on behalf of the individual and also a clear testament to the overall knowledge and skill set as evaluated by an examination. The concept of certifications eliminates the requirement of the hiring official having to
    “test” the job candidate or having to evaluate their depth of knowledge by some manner.