The Cyber Skilled Mariner, Management of Information and Systems Security
- Length0 Days
This course presents a systemic approach to implementing and managing effective information security in contemporary highly networked Maritime system. Students will learn about the security challenges faced by individuals and organizations in the information age and introduces the complex and dynamic state of information assurance in cyberspace. It is intended to sensitize Maritime stakeholders to the pitfalls and dangers of doing business in a cyber-ecosystem, and to familiarize the student with various organizations and materials that can be turned to for assistance in understanding how to operate and use modern Maritime systems and networks securely with the maritime community and system vendors to the community. Shipboard and shoreside technology and management issues related to managing the elements of Cybersecurity will be addressed.
The course will run 1200 EDT to 1600 EDT.
An advance option for a project/ exercise will also be offered when onsite instruction is available.
These courses are also approved for Global Information Assurance Certification (GIAC) continuing education credits. GIAC grants approval for continuing education for certification maintenance. Attendance will count for one Continuing Professional Experience (CPE) per hour. There may be some limitations as to how many CPEs that may be counted towards for one course. Anyone interested, should check with GIAC for details at: https://www.giac.org/certifications/renewal
This course is not Eligible for the MATES Program.
What You Will Learn
The course will be offered in eight (8) 4 hour units starting with a Cyber Skilled Mariner overview aimed at familiarizing students with the Threats, Vulnerabilities, Risk Management overview, and Personnel Security Awareness/ Training that can be implemented to address these in the maritime cyber-ecosystem. The class with also address Privacy/ Security wrt Social Media.
Each other 4 hour unit will dive into more detail discussion related to:
- Assessing & Managing Security Risk
- Understanding Information States and Security Life Cycle
- Security Policy/ Law
- Physical/ Environmental Security
- Cryptography and Logical Access Controls, Auditing, Network Security
- Change Management.Detecting Problems
- Continuity of Business/ Contingency Planning