Status message

You have successfully added GCSE 4091V to Course list.

Global Cybersecurity

Classes

GCSE 1351: Introduction to Enterprise Cybersecurity

This course will take an enterprise level holistic perspective of cybersecurity. The purpose is to explore the emerging threat landscape and the means through which organizations both private and public develop and employ various cybersecurity policies, procedures, and tactics in response. It will evaluate the various cybersecurity tools, structures, and protocols that serve as best practices within industry, by governments, and international organizations.
Add to Comparison

GCSE 4302: Cyber Ethics and the State

The course will examine the impact on human society of the rapid evolution of digital surveillance tools, artificial intelligence, internet of things, and the increase of computing power. It asks the question of whether technology should drive the course of human progress or will society engage in a value laden conversation about role of human agency in that process. Further, we will bring the question of ethics into an environment that seems to operate under its own imperative. As we are told that at some point computers and smart machines empowered through artificial intelligence will achieve self-awareness. We will look at the institutions necessary for establishing the foundations of an open dialog to determine the appropriate role for these technologies in society. The course will engage students in a debate as to whether or not we can build a technological future based on an ethical framework and if so, how we are to go about it.
Add to Comparison

GCSE 4302: Cyber Ethics and the State

The course will examine the impact on human society of the rapid evolution of digital surveillance tools, artificial intelligence, internet of things, and the increase of computing power. It asks the question of whether technology should drive the course of human progress or will society engage in a value laden conversation about role of human agency in that process. Further, we will bring the question of ethics into an environment that seems to operate under its own imperative. As we are told that at some point computers and smart machines empowered through artificial intelligence will achieve self-awareness. We will look at the institutions necessary for establishing the foundations of an open dialog to determine the appropriate role for these technologies in society. The course will engage students in a debate as to whether or not we can build a technological future based on an ethical framework and if so, how we are to go about it.
Add to Comparison

GCSE 4303: Geopolitical and Country Risk Analysis

A risk management perspective that looks at the socio-political factors that pose risks to foreign policy investments and/or business operations in foreign countries. Factors considered such as, political stability, corruption, taxation, regulatory and legal structures, regional conflicts, local economy, internal strife, and the potential for natural disaster. This analysis emphasizes not only the risk factors, but the internal decision making matrix of the political system within the target country and the impact of such decisions on the investment climate and business operations.
Add to Comparison

GCSE 4379: Cyber Warfare

This course looks at the growth and scope of cyber warfare as it impacts national power in the domains of government, diplomacy, international law, international commerce/economic power, social media/privacy, science/technology, and civil society. It traces the evolution of conflict from traditional information gathering to the development of cyber weaponry with destructive capabilities and the use of those capabilities to advance national foreign policy interests.
Add to Comparison

GCSE 5301: Cybersecurity Program Fundamentals

The foundational course for the program will examine the overall concept of cybersecurity within a business enterprise and/or public sector organization. It will work students through the CIA Triade (Confidentiality, Integrity, and Availability) which forms the basis of all network operations. In addition, the course will introduce the concept of the Threat, Vulnerability and Risk matrix and how to develop a computer system security program through the process of system auditing, threat intelligence, vulnerability assessment and risk analysis.
Add to Comparison

GCSE 5302: The Regulatory Compliance and Legal Landscape of Cybersecurity

This course will introduce students to the broad legal and regulatory framework within the digital ecosystem specifically in regards to compliance and the emerging legal landscape. Students will examine International (EU – GDPR), Federal (FISMA, Cybersecurity Information Sharing Act, Presidential Policy Directives/Executive Orders) DHS - Cybersecurity and Infrastructure Security Agency, and the National Institute of Standards and Technology (NIST), State California Consumer Privacy Act (CCPA), Texas data Privacy and Security Act and the litigation risk exposure that comes from noncompliance. Students will explore the developing case law around lawsuits generated due to cyber breach incidents.
Add to Comparison

GCSE 5303: Organizational Resilience and Incident Response

The focal point of this course will be to develop an understanding of business continuity, and cyber incident response under an overall organizational resilience framework. First students will compare various organizational resilience frameworks NIST, ISO (International Standards Organization), BSI (British Standards Institute) and then apply one of these frameworks in a simulated environment. Then using the selected framework students will manage a cyber-breach incident and conduct an after action 'hot wash' to determine operational success or failure of the selected framework against the threat.
Add to Comparison

GCSE 5304: Managing Cybersecurity Operations

This course is focused on the day-to-day management of a cybersecurity program within an organization. After having created an organizational resilience and incident response plan, students will be directed to the operational requirements of managing an operational cybersecurity program. It will answer the question of how to coordinate with a broad spectrum of stakeholders; IT, client support, managed service providers, the application of artificial intelligence, workforce development, procurement and supply chain, internet service providers (ISP), facilities, and employee training and awareness.
Add to Comparison

GCSE 5305: Program Development and Executive Reporting

The final course in the series is where students hone their skills on “selling” their program to senior leadership at the C-Suite/Board level. A program that has been developed but is not funded or supported by senior leadership is useless. This course will focus on how to get buy-in from policy makers, secure funding through the budgetary process, locate and acquire talent, build relationships, and to prepare reports and presentations to spread the message and influence outcomes.
Add to Comparison