Introduction to cybersecurity  

The course “Introduction to Cybersecurity” is an essential component of IT specialist theoretical training that enables students to orient effectively in modern IT and security issues. This course focuses on basics and methods that ensure a global approach to the company’s IT security organization and management decision making to ensure the secured and effective achievement of business objectives. The course thoroughly examines the modern cyber security approach in the overall enterprise IT management context, IT governance frameworks, the company's IT security strategy, IT governance control methodology and IT audit, as well as the practical application of acquired knowledge. Outcome: Are able to define, interpret and use professional terminology in cybersecurity area. - While conducting discussions, the ability to constructively discuss the problem using professional terminology and to select the proper solution is demonstrated. Are able to reasonably discuss the choice of cybersecurity solutions, as well as to summarise the ideas of their colleagues when working in groups and present the results of group work. - During seminars and labs, the ability to constructively discuss the problem to be solved is shown (using brainstorming, discussions, group problem solving, etc.), based on theoretical knowledge and using professional terminology. Are able to analyse specific situations and draw independent conclusions on the use of cybersecurity and IT management methodologies in business. - While doing individual research project, the ability to suggest alternative solutions to the selected problem as well for performing a comparative analysis of those alternatives has been demonstrated. Are able to explain the cybersecurity approach, opportunities and role in business. - When passing the examination, the ability to understand the essence of the task stated is shown as well as the ability to provide a laconic and well-reasoned proper cybersecurity solution to the business.
Presential
English
Introduction to cybersecurity
English

Funded by the European Union. Views and opinions expressed are however those of the author(s) only and do not necessarily reflect those of the European Union or HaDEA. Neither the European Union nor the granting authority can be held responsible for them. The statements made herein do not necessarily have the consent or agreement of the ASTRAIOS Consortium. These represent the opinion and findings of the author(s).