This course covers issues involved in protecting an e-business from external threats while safeguarding customer privacy. Students examine external threats to a company’s systems and learn how to react if systems and business goals conflict.
Learning Objectives
- Develop an understanding of the way systems and business goals conflict. The essential elements of a corporate security management program are analyzed in terms of its value and impact to the organization. Attention is paid to behavioral, financial and agility conflicts.
- Design guidelines, policies and procedures that should assure customer privacy and comply with current laws, while also providing personalized and customized E-Businesses services. Develop a practical understanding of how techniques such as data-mining, collaborative-filtering, and adaptive marketing systems can violate customer privacy, and destroy customer confidence.
- Demonstrate a sound understanding of those threats in terms of their, origins, motivations, limits, goals, trends and destructive potential. Attention is paid to individual hackers, hacker teams, corporate espionage threats, political enemies, and organized crime.
- Demonstrate the ability to properly utilize proactive security techniques. Attention is paid to penetration testing, ethical hacking, intrusion countermeasures, and intrusion detection technologies. Both managerial and technical aspects are explored.
- Define and document the job functions, organizational structure, and staffing requirements that should foster a highly-secure E-Business environment. Attention is also paid to integration with contracted security management services.
- Forecast and justify enterprise and business-unit security programs. Examine the issues associated with continuous cost/benefit analysis, global security projects, contingency planning, disaster recovery drills, and corporate mergers as they effect security system integration.
- Understand the current options available through private and public organizations, both national and international. Vendor relationship management, risk sharing, change control and performance measurements are closely examined.
Framework Connections
The materials within this course focus on the NICE Framework Task, Knowledge, and Skill statements identified within the indicated NICE Framework component(s):
Specialty Areas
- Cyber Defense Analysis
- Cyber Operational Planning
- Systems Administration
- Systems Analysis
- Systems Requirements Planning
Feedback
If you would like to provide feedback on this course, please e-mail the NICCS team at NICCS@mail.cisa.dhs.gov. Please keep in mind that NICCS does not own this course or accept payment for course entry. If you have questions related to the details of this course, such as cost, prerequisites, how to register, etc., please contact the course training provider directly. You can find course training provider contact information by following the link that says “Visit course page for more information...” on this page.