CSOL 530-Cybersecurity Risk Management was the last course while accomplishing the master's degree journey. This course captured all severe threats that could negatively impact any organization and its digital infrastructure. During this class, students could analyze how an organization would be affected based on each security risk.
Valuable Resources
Barker, E. B. (2016, August). Guideline for Using Cryptographic Standards in the Federal
Government: Cryptographic Mechanisms. https://doi.org/10.6028/nist.sp.800-175b
Barker, E., & Roginsky, A. (2015, November). NIST Laboratory Information Systems Team –
Problem processing request. Nist.Gov. https://nvlpubs.nist.gov/nistpubs/SpecialPublications/NIST.SP.800-131Ar1.pdf
Burnham, K. (2021). What is Security Configuration Management? | Endpoint. Tanium. Retrieved from https://www.tanium.com/blog/what-is-security-configuration-management/.
Centers for Medicare & Medicaid Services Information Security and Privacy Group Plan of
Action and Milestones Process Guide. Cms.gov. (2021). Retrieved from https://www.cms.gov/files/document/cms-poam-process-guide-v11.pdf.
Cybersecurity Framework – Payroll Profile. Nist.gov. (2022). Retrieved from
https://www.nist.gov/system/files/documents/2021/11/09/CSF%20Payroll%20Profile%20Checklist%5B33%5D.pdf.
Harvey, S. (2020). 4 Common Types of Data Classification | KirkpatrickPrice. KirkpatrickPrice Home. Retrieved from https://kirkpatrickprice.com/blog/classifying-data/.
Moyle, E., & Kelley, D. (2020). Practical Cybersecurity Architecture (pp. 51-87). Packt Publishing.
Murray, N. (2017). Retrieved from https://www.researchgate.net/profile/Nya-
Murray/publication/332866182_Cloud_Application_Security_Architecture_Overview/links/5cceaca4458515712e929c91/Cloud-Application-Security-Architecture-Overview.pdf?origin=publication_detail.
Network Application Consortium-Pubs.opengroup.org. (2004). Retrieved from
https://pubs.opengroup.org/onlinepubs/9199929899/toc.pdf.
Threat Intelligence Report for the Telecommunications Industry. Kaspersky. (2016). Retrieved
from https://media.kasperskycontenthub.com/wp-content/uploads/sites/43/2018/03/07185213/Kaspersky_Telecom_Threats_2016.pdf.
Valuable Resources
Barker, E. B. (2016, August). Guideline for Using Cryptographic Standards in the Federal
Government: Cryptographic Mechanisms. https://doi.org/10.6028/nist.sp.800-175b
Barker, E., & Roginsky, A. (2015, November). NIST Laboratory Information Systems Team –
Problem processing request. Nist.Gov. https://nvlpubs.nist.gov/nistpubs/SpecialPublications/NIST.SP.800-131Ar1.pdf
Burnham, K. (2021). What is Security Configuration Management? | Endpoint. Tanium. Retrieved from https://www.tanium.com/blog/what-is-security-configuration-management/.
Centers for Medicare & Medicaid Services Information Security and Privacy Group Plan of
Action and Milestones Process Guide. Cms.gov. (2021). Retrieved from https://www.cms.gov/files/document/cms-poam-process-guide-v11.pdf.
Cybersecurity Framework – Payroll Profile. Nist.gov. (2022). Retrieved from
https://www.nist.gov/system/files/documents/2021/11/09/CSF%20Payroll%20Profile%20Checklist%5B33%5D.pdf.
Harvey, S. (2020). 4 Common Types of Data Classification | KirkpatrickPrice. KirkpatrickPrice Home. Retrieved from https://kirkpatrickprice.com/blog/classifying-data/.
Moyle, E., & Kelley, D. (2020). Practical Cybersecurity Architecture (pp. 51-87). Packt Publishing.
Murray, N. (2017). Retrieved from https://www.researchgate.net/profile/Nya-
Murray/publication/332866182_Cloud_Application_Security_Architecture_Overview/links/5cceaca4458515712e929c91/Cloud-Application-Security-Architecture-Overview.pdf?origin=publication_detail.
Network Application Consortium-Pubs.opengroup.org. (2004). Retrieved from
https://pubs.opengroup.org/onlinepubs/9199929899/toc.pdf.
Threat Intelligence Report for the Telecommunications Industry. Kaspersky. (2016). Retrieved
from https://media.kasperskycontenthub.com/wp-content/uploads/sites/43/2018/03/07185213/Kaspersky_Telecom_Threats_2016.pdf.