• Classroom
  • Online, Instructor-Led
Course Description

This course covers issues involved in protecting an e-business from external threats while safeguarding customer privacy. Students examine external threats to a company’s systems and learn how to react if systems and business goals conflict.

Learning Objectives

  • Develop an understanding of the way systems and business goals conflict. The essential elements of a corporate security management program are analyzed in terms of its value and impact to the organization. Attention is paid to behavioral, financial and agility conflicts.
  • Design guidelines, policies and procedures that should assure customer privacy and comply with current laws, while also providing personalized and customized E-Businesses services. Develop a practical understanding of how techniques such as data-mining, collaborative-filtering, and adaptive marketing systems can violate customer privacy, and destroy customer confidence.
  • Demonstrate a sound understanding of those threats in terms of their, origins, motivations, limits, goals, trends and destructive potential. Attention is paid to individual hackers, hacker teams, corporate espionage threats, political enemies, and organized crime.
  • Demonstrate the ability to properly utilize proactive security techniques. Attention is paid to penetration testing, ethical hacking, intrusion countermeasures, and intrusion detection technologies. Both managerial and technical aspects are explored.
  • Define and document the job functions, organizational structure, and staffing requirements that should foster a highly-secure E-Business environment. Attention is also paid to integration with contracted security management services.
  • Forecast and justify enterprise and business-unit security programs. Examine the issues associated with continuous cost/benefit analysis, global security projects, contingency planning, disaster recovery drills, and corporate mergers as they effect security system integration.
  • Understand the current options available through private and public organizations, both national and international. Vendor relationship management, risk sharing, change control and performance measurements are closely examined.

Framework Connections

The materials within this course focus on the NICE Framework Task, Knowledge, and Skill statements identified within the indicated NICE Framework component(s):

Specialty Areas

  • Cyber Defense Analysis
  • Cyber Operational Planning
  • Systems Administration
  • Systems Analysis
  • Systems Requirements Planning

Specialty Areas have been removed from the NICE Framework. With the recent release of the new NICE Framework data, updates to courses are underway. Until this course can be updated, this historical information is provided to give better context as to how it can help you with your cybersecurity goals.