Class Central is learner-supported. When you buy through links on our site, we may earn an affiliate commission.

LearnQuest

Strategic Edge Security Management

LearnQuest via Coursera

Overview

Save Big on Coursera Plus. 7,000+ courses at $160 off. Limited Time Only!
This course is designed for Enterprise IT Leaders, Cybersecurity Professionals, and Cloud Service Providers. This final course in the series looks at edge security from a strategic perspective. By the end of this course, learners will be able to explain the impact of edge computing breaches, identify edge computing risk identification methodologies, estimate cyber-attack probability with threat data and trends, prioritize potential risks specific to edge computing environments, develop risk mitigation strategies, list real-time monitoring and incident response solutions, list options involved with harmonizing edge computing standards across different regions and industries, and more. Topics for Module 1 will include risk analysis and security risks for edge computing. Module 2 consists of risk prioritization, developing a risk mitigation strategy for edge computing, real-time monitoring, and scalable and adaptive security solutions. During Module 3, you will gain knowledge of compliance with international security standards and ways to stay compliant and updated with changes in edge computing.

Syllabus

  • Module 1: Edge Computing Risk Analysis
    • During this module, we will focus on understanding the consequences and implications of edge computing breaches, providing insights into various aspects of risk assessment, cyber-attack probability estimation, and evaluating the aftermath of cyber incidents on organizations.
  • Module 2: Developing a Risk Mitigation Strategy for Edge Computing Security Risks
    • During this module, we will develop risk mitigation strategies tailored to the unique challenges of edge computing environments and effectively implement continuous improvement and measurement practices to enhance edge security and resilience.
  • Module 3: International Standards and Compliance in Edge Computing
    • During this module, we will explore the complex world of international standards in edge computing and the challenges of maintaining compliance in a swiftly changing environment.

Taught by

Vahab Iranmanesh

Reviews

Start your review of Strategic Edge Security Management

Never Stop Learning.

Get personalized course recommendations, track subjects and courses with reminders, and more.

Someone learning on their laptop while sitting on the floor.