This lab exercise explores the Hicks-Hyman Law (sometimes referred to as simply Hicks Law).
This lab exercise introduces the concept of quality costs and shows you how to analyze and interpret quality cost data for a hypothetical organization that uses the NIST Cybersecurity Framework for risk management, and has designed its cost accounting system around the structure of the Framework Core. It applies concepts learned during Lesson 3H in Module 3: Managing Security, Safety,
This lab exercise introduces a quantitative approach to risk analysis using Failure Mode Effects Analysis (FMEA) and Risk Priority Number (RPN), and analytical methods for prioritization (ANOVA). It applies concepts learned during Lesson 3B in Module 3: Managing Security, Safety, and Risk of the Cyber-Physical Industry course.
Cybersecurity requires foundational knowledge from a wide array of topics including: mathematics, coding, networking, web-technologies, operating systems and complex software applications such as database management systems. Clearly, an introductory course cannot cover all these topics.
Computer use is required of almost all professions in today’s technological world and yet how they work is mysterious. This module starts from electrons and transistors and builds up to the major components of a computer. It spends a significant portion of the time describing binary logic since that is fundamental to understanding a computer. With the knowledge gained in this course a student will be able to describe how a computer works and will be able to understand the importance of various characteristics of the computer.
This module provides some instruction on the writing of code, but is primarily focused on how the code works. Fundamentals of coding and memory handling are included. Some security implications of these low-level memory operations are discussed.
This is the third module in the Cyber Intelligence: Analyzing Cyber Adversaries and Threats course. The purpose of this module is to introduce students to the emerging discipline of cyber intelligence that uses the intelligence cycle to conduct analysis and support decision making.
This is the second module in the Cyber Intelligence: Analyzing Cyber Adversaries and Threats course. The purpose of this module is to introduce students to the emerging discipline of cyber intelligence. The material is approached from the perspective of what are examples of sophisticated cyber threats and how are they driving businesses to consider an intelligence-driven approach to cyber security called cyber intelligence.