Professional Education Subject
Learn how to protect your network, systems, and sensitive customer data in a Georgia Tech Information Security course. Topics include incident response and detection, legal requirements for data protection, and developing a business continuity plan. Home to the renowned Georgia Tech Information Security Center (GTISC), you can trust Georgia Tech to deliver a up-to-date information security training for today's IT professionals.
Courses In This Subject
- Cyber Security and Embedded Systems (DEF 4604P)—
Use embedded systems more effectively by considering cyber security in product designs right from the start. Think like a “hacker” to understand vulnerabilities and then identify best practices for mitigating risk.
- Cyber Security Essentials for Decision Making (DEF 4600P)—
Explore emerging threats and operational challenges faced in securing sensitive data, networks, mobile devices, and applications, and learn the fundamentals of risk assessment and management, incident handling, business continuity planning, and associated legal/ethical issues.
- Cyber Security: A Systems Approach (DEF 4513P)—
This course walks through information security vulnerabilities to highlight the issues with complex systems.
- Exploitation and Defense of IT Systems: Hands-on Lab (DEF 4602P)—
Learn how to be a white hat and think like a hacker when designing products and systems, and their related security measures. Gain exposure to common exploits against IT systems and how to better defend and respond to these threats.
- Fundamentals of Cyber Security (COMP 2500P)—
Learn about what it takes to manage and operate an information security program, and focus on areas such as risk assessment, risk management, incident handling, and business continuity planning.
- Fundamentals of Cyber Test and Evaluation (DEF 4603P)—
Obtain an overview of the Cyber domain and how test and evaluation is used for Cyber systems.
- Information Security: Business Continuity and Disaster Recovery - From Strategy to Execution (COMP 2160P)—
Learn how an integrated Business Continuity Program is structured and functions to provide cost conscious planning, provisioning, and response to corporate threatening incidents/events, regardless of their source.
- Information Security: Create a Foundation for your Plan with Organizational Policy and Executive Reporting (COMP 2130P)—
Effective information security policy development, which leverages existing organization policies and culture, has a greater chance of being approved and successfully implemented. Acquire guidance on critical information security policy elements, communicating the policy organization-wide, and executive reporting.
- Information Security: Development, Communication, and Implementation of an Effective IS Plan (COMP 2140P)—
Information security plans must have solid support from executive management and a foundation of good policies to be successful. Gain guidance in the development of an information security plan with a set of programs that can be executed and are measurable. Get templates and example programs that can be immediately modified and incorporated into your business environment, regardless of your industry.
- Information Security: Incident Detection and Response (COMP 2150P)—
Take an in-depth look at intrusion detection and prescribe appropriate actions to prevent compromise of enterprise information assets. Learn to be proactive in your information security stance. Allow the enterprise to quickly determine security trends and communicate risks to business units and senior management.
- Information Security: Legal Requirements Concerning Privacy and Data Protection (COMP 2120P)—
Establishing and following sound information security practices is good policy and, in many cases, is required by law. Learn what federal and state laws apply to information security, as well as foreign laws that apply to information security. Explore privacy law—common and statutory; intellectual property law—intentional and unintentional disclosure can result in loss of rights; negligence—liability can result from failure to exercise reasonable care to protect data that results in identity theft; and contractual obligations.
- Information Security: Protecting the Expanding Enterprise (COMP 2100P)—
Gain an overview of the critical elements for an effective information security program. Explore strategic and tactical issues with a focus on facilitating the business of an organization. Examine policy, people, process, standards, and technology through real-world case studies and examples that can be implemented within your environment.
- Introduction to Network-Centric Warfare Technologies, Systems and Test and Evaluation (DEF 2508P)—
Commercial technologies and systems developed for the military are being combined to provide connectivity at all levels of command and operational environments. Get a practical, hands-on introduction to command and control concepts, systems, and test & evaluation.
- Malware Analysis (DEF 4601P)—
Gain a foundational understanding of malicious software, how malware has shaped the global cyber security landscape, and its future impact. Discussions and hands-on exercises will demonstrate malware analysis processes and their complexities as well as illustrate how to appropriately size, design and build an analytical capability best suited for your organization.
- Mobile Device Security (DEF 4605P)—
Learn to design and administer an effective mobile device strategy that protects data confidentiality and integrity.