. "Security And Privacy"@en . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . "Software security"@en . . "6" . "Software security risk analysis and security assurance is the essential part of the information technology management. Students learn security risk analysis and management in the context of software life cycle, risks of software development process and risks mitigation methods, a use of reverse engineering techniques for analysis of weaknesses in software security, security testing and legal aspects of information system security. Teamwork approach is used for analysis of practical case studies.\n\nOutcome:\nCan summarize arguments on risk management stages and quantitative and qualitative methods of risk evaluation - Passed assignment or quiz on risk management and exam. Criteria: is able to explain and provide arguments on the stages of risk management; is able to explain risk assessment methods; is able to evaluate the strengths and weaknesses of risk assessment methods.\r\nIs able to perform risk analysis of software development project and prepare risk mitigation plan - Passed practical assignment performed on software development project risk evaluation case study. Criteria: is able to identify and assess project risks; is able to propose and justify a risk mitigation plan for a specific project.\r\nIs able to perform information system security risk analysis and prepare risk mitigation plan - Passed practical assignment performed on security risk evaluation case study. Criteria: is able to identify and assess the security risks of information systems; is able to propose and justify a risk mitigation plan for a specific project.\r\nCan summarize arguments on reverse engineering techniques for discovering software security risks and protecting intellectual property - Passed assignment or quiz on reverse engineering techniques and exam. Criteria: is able to explain the stages of risk management in a reasoned manner; is able to explain risk assessment methods; is able to assess the strengths and weaknesses of risk assessment methods.\r\nIs able to apply reverse engineering techniques for discovering software security risks and protecting intellectual property - Passed practical assignment. Criteria: is able to orientate in reverse engineering methods for software security risk detection; is able to select and apply specific methods for detection of security risks and protection of intellectual property.\r\nIs able to justify software security testing types and perform security testing - Passed practical assignment. Criteria: is able to explain the characteristics of software security testing methods; is able to assess the suitability of the security testing method for the task; is able to independently apply the chosen security method in testing.\r\nCan summarize arguments on personal data protection rules and principles of e-documents security - Passed assignment and exam. Criteria: is able to list the main articles of the specified law; is able to formulate the principles of e-document protection; is able to apply legal requirements and e-document protection principles in the analyzed situation." . . "Presential"@en . "TRUE" . . "Master of Cybersecurity Engineering"@en . . "https://international.rtu.lv/masters-studies/cybersecurity-engineering/" . "120"^^ . "Presential"@en . "The mission of the academic master’s study programme “Cybersecurity Engineering” is to provide a set of theoretical knowledge and practical skills for students to achieve competencies corresponding to a Master’s degree in cybersecurity engineering. In the academic Master’s studies, the student acquires the necessary knowledge, skills and competence for comprehensive and effective action in the field of cybersecurity engineering in the chosen economic sector – design, implementation, improvement and management of IT security systems, understanding of professional ethics and socially responsible management, which forms the basis for further studies for a higher level of knowledge and skills acquisition.\n\nThe aim of the study programme “Cybersecurity Engineering” is to prepare top level specialists in cybersecurity who can (1) understand and develop the cybersecurity policy of companies and various organizations as well as public space; 2) design, implement, monitor and proactively develop cybersecurity measures; (3) conducting international research in cybersecurity; and (4) continue education for professional development or in doctoral studies.\n\nOutcome:\nAs a result of the studies the graduate is able to:\n- identify, justify and formulate information technology security issues;\n- design, implement and operate cybersecurity management systems;\n- analyse, evaluate and develop management systems according to IT security requirements;\n- develop a corporate digital strategy and align it with the information security strategy;\n- critically analyse a system monitoring data, identify and manage cybersecurity risks;\n- apply IT, cybersecurity, data mining and integration tools and techniques, as well as social technologies to protect company information assets;\n- develop organizational measures and technical solutions for cybersecurity threats;\n- integrate information security solutions at the network, hardware, software data and process levels and synthesize unified and systemic security management solutions;\n- ensure safe operation of engineering and socio-technical systems;\n- provide organizational measures and technical solutions for the protection of the company's critical infrastructure;\n- assess and ensure that information security solutions meet industry standards and legal requirements;\n- communicate, advise, collaborate and argue for cybersecurity objectives and outcomes;\n- independently conduct scientific research in information technologies"@en . . . "2"@en . "FALSE" . . "Master"@en . "Thesis" . "Not informative" . "no data"@en . "Not informative" . "None" . "Graduates of the study programme are prepared for work in both the state and local government, as well as in the private sector – in commercial companies, small and medium enterprises. The study programme is suitable for students who want to become a cybersecurity analyst, cybersecurity engineer, cybersecurity architect, cybersecurity consultant. Graduates are also prepared for continuing work in industrial research and development as well as in scientific research and higher education."@en . "no data" . "TRUE" . "Midstream"@en . . . . . . . . . . . . . . . . . . .