Strategic Edge Security Management
Offered By: LearnQuest via Coursera
Course Description
Overview
This course is designed for Enterprise IT Leaders, Cybersecurity Professionals, and Cloud Service Providers. This final course in the series looks at edge security from a strategic perspective. By the end of this course, learners will be able to explain the impact of edge computing breaches, identify edge computing risk identification methodologies, estimate cyber-attack probability with threat data and trends, prioritize potential risks specific to edge computing environments, develop risk mitigation strategies, list real-time monitoring and incident response solutions, list options involved with harmonizing edge computing standards across different regions and industries, and more.
Topics for Module 1 will include risk analysis and security risks for edge computing. Module 2 consists of risk prioritization, developing a risk mitigation strategy for edge computing, real-time monitoring, and scalable and adaptive security solutions. During Module 3, you will gain knowledge of compliance with international security standards and ways to stay compliant and updated with changes in edge computing.
Syllabus
- Module 1: Edge Computing Risk Analysis
- During this module, we will focus on understanding the consequences and implications of edge computing breaches, providing insights into various aspects of risk assessment, cyber-attack probability estimation, and evaluating the aftermath of cyber incidents on organizations.
- Module 2: Developing a Risk Mitigation Strategy for Edge Computing Security Risks
- During this module, we will develop risk mitigation strategies tailored to the unique challenges of edge computing environments and effectively implement continuous improvement and measurement practices to enhance edge security and resilience.
- Module 3: International Standards and Compliance in Edge Computing
- During this module, we will explore the complex world of international standards in edge computing and the challenges of maintaining compliance in a swiftly changing environment.
Taught by
Vahab Iranmanesh
Related Courses
Fog Networks and the Internet of ThingsPrinceton University via Coursera AWS IoT: Developing and Deploying an Internet of Things
Amazon Web Services via edX Business Considerations for 5G with Edge, IoT, and AI
Linux Foundation via edX 5G Strategy for Business Leaders
Linux Foundation via edX Intel® Edge AI Fundamentals with OpenVINO™
Intel via Udacity