The short course has as its learning outcomes awareness, understanding and application of the key principles of Cyber & Cyber Governance:
At the end of the module a student will be able to?
what will the student be able to do? Explain the fundamentals of Cyber & Cyber Governance.
in what context? How not just the IM entity but the organisation as a whole is both impacted and has a responsibility in understanding and mitigating cyber risks.
How well? To communicate background and risks to IM & non IM colleagues and be able to predict likely outcomes to scenarios/problems posed.
João Francisco Ribeiro da Silva Martins
Weekly - Available soon
Total - Available soon
Portuguese. If there are Erasmus students, classes will be taught in English
Franke, Don (2016). Cyber Security Basics: Protect your organization by applying the fundamentals, 1st ed, CreateSpace Independent Publishing Platform. ISBN-13: 978-1522952190.
Vacca, John R. (2013). Cyber Security and IT Infrastructure Protection, 1st Edition, Syngress. ISBN-13: 978-0124166813 .
Trim, Peter; Lee, Yang-Im (2014). Cyber Security Management: A Governance, Risk and Compliance Framework. Routledge. ISBN-13: 978-1472432094.
The learning outcomes of this module not only require the students to understand the content, but reform and contextualise their learning to various scenarios and environments, and to communicate effectively while doing so. As such we test traditional learning and comprehension using written examination, but use interactive sessions as well as practical exercises and examinations to cement a deeper and more versatile understanding of the underlying principles.
The teaching method is based on the following procedures:
1) oral expositions by the Professor utilizing several teaching and academic tools with an emphasis on interactive learning;
2) Practical exercise in the format of a simulation;
3) Multiple choice & written examination
1. What is Cyber? Introducing Defence, Security, Operations & Governance?
2. Organisational Cyber Threat - Systems (inc IOT), People & Governance
3. Common threats in Cybersecurity
3.1 Backdoor exploitation
3.2. Denial-of-Service attacks
3.3. Equipment tampering
3.4 Privilege escalation
3.7. Social engineering & hacking: eavesdropping, spoofing and direct-access attacks
4. Countermeasures and the impact of security breaches
5. Cyber Governance 101
6. Cyber Security through design, architecture, measures and culture
7. Breach response and crisis management