UNIVERSITY OF DAR ES SALAAM COMPUTING CENTRE

Excellence, Innovation and Technological Foresight
  • user Teacher Elon Gated
  • Last Update: July 24, 2022
  • Review: 4.5
user

About This Course

<p style="margin-left:0in; margin-right:0in; text-align:justify"><span style="font-family:Tahoma,Geneva,sans-serif"><strong>Course Overview</strong></span></p> <p style="margin-left:0in; margin-right:0in; text-align:justify"><span style="font-size:11pt"><span style="font-family:Calibri,sans-serif"><span style="font-family:"Bookman Old Style",serif"><span style="color:#333333">Cyber Security is an ever increasing topic for business leaders to consider, either as part of their ongoing business risk management or in order to prepare for supply chain certification and accreditation. </span></span></span></span></p> <p style="margin-left:0in; margin-right:0in; text-align:justify"><span style="margin-left:0in; margin-right:0in; text-align:justify"><span style="font-family:Tahoma,Geneva,sans-serif"><strong>Who Should Attend</strong></span></span></p> <p style="margin-left:0in; margin-right:0in; text-align:justify"><span style="font-size:11pt"><span style="font-family:Calibri,sans-serif"><span style="font-family:"Bookman Old Style",serif"><span style="color:#333333">Anyone who wishes to understand the context, process, terminology and structure of Information Risk Management, Those who are aware of the growing importance of cyber security and want to understand how to address the needs of their company and/or own responsibilities, Those that have responsibility for contracting Information Assurance services and wish to be able to manage the delivery of those services with a greater understanding of what is expected, Those who would benefit from a non-technical view of cyber security issues.</span></span></span></span></p> <p style="margin-left:0in; margin-right:0in; text-align:justify"><span style="margin-left:0in; margin-right:0in; text-align:justify"><span style="font-family:Tahoma,Geneva,sans-serif"><strong>Course Objectives</strong></span></span></p> <p><span style="font-size:11.0pt"><span style="font-family:"Bookman Old Style",serif"><span style="color:#333333">Through attending this one day Information Risk Management Overview course you will be able to understand the processes and measures that are used to manage risk to business critical information in an increasingly challenging cyber security environment. You will be able to apply this overview to your own organisation and understand the analysis, assessment and measures required to improve your business resilience. Finally you will learn about the various accreditation and certification frameworks, their suitability and their relevance. This is an interactive session led by a practicing professional. Attendees will share experiences and discuss situations.</span></span></span></p>

  • Learning Objectives

  • Find a new position involving
    Data modeling.
  • Expanded responsibilities as part of
    an existing role.
  • Ready to begin working on real-world
    data modeling projects.
  • Other Instructors

  • user Eleanor Fant Instructor
  • user Lauren Stamps Teacher
  • user Jonquil Von Associate

Course Curriculum

Lorem Ipsn gravida nibh vel velit auctor aliquet. Aenean sollicitudin, lorem quis bibendum auci elit consequat ipsutis sem nibh id elit. Duis sed odio sit amet nibh vulputate cursus a sit amet mauris. Morbi accumsan ipsum velit.

  • Week 1
  • 0/4

Beginners level

Lorem ipsum dolor sit amet, consectetur dolorili adipiscing elit. Felis donec massa aliquam id.Lorem ipsum dolor sit amet, consectetur adipiscing elit.

2 Videos,1 Audio,1 Reading

  • Video: Greetings and Introductions 2 questions 12 minutes
  • Video: Introducing Elizabeth Gerber 26 minutes
  • Audio: Michael Chapman of IDEO on Interviewing 14 minutes
  • Reading: Slides 19 minutes
  • Week 2
  • 0/6

Diplomatic Language

Lorem ipsum dolor sit amet, consectetur dolorili adipiscing elit. Felis donec massa aliquam id.Lorem ipsum dolor sit amet, consectetur adipiscing elit.

1Videos,1 Audio,2 Reading

  • Reading: Collocations For Job Interview 12 minutes
  • Video: Connecting through Technology 26 minutes
  • Audio: Strategic Leadership 3 questions 8 minutes
  • Reading: Web Coding Basics 6 minutes

Reviews

Lorem Ipsn gravida nibh vel velit auctor aliquet. Aenean sollicitudin, lorem quis bibendum auci elit consequat ipsutis sem nibh id elit.

5
4 Ratings

Detailed Rating

5 stars

100%

4 stars

30%

3 stars

2 stars

1 stars

2 Comments

Write a Review

Ratings:

Members Info

Lorem Ipsn gravida nibh vel velit auctor aliquet. Aenean sollicitudin, lorem quis bibendum auci elit consequat ipsutis sem nibh id elit. Duis sed odio sit amet nibh vulputate cursus a sit amet mauris. Morbi accumsan ipsum velit. Nam nec tellus a odio tincidunt auctor a ornare odio. Sed non mauris vitaes erat consequat auctor eu in elit.

Total number of students in course: 24

  • user Douglas Lyphe Instructor
  • 04 Courses
  • 02 Reviews
  • 2.50 Rating
  • user Jason Response Teacher
  • 07 Courses
  • 8 Reviews
  • 3.50 Rating
  • user Eleanor Fant Associate
  • 02 Courses
  • 05 Reviews
  • 4.00 Rating


Related Courses

Chat Support Hello, may I help you?
UCC Logo
UCC
Digital Assistant
×
Chat started
Welcome
Please select one of the following options: