. "Secure e-commerce technologies"@en . . "3" . "The course covers the latest computer technologies in the field of e-commerce, focusing on security risks, issues and solutions for the web environment and e-commerce systems. The course focuses on the use of e-commerce methods and information technology in business with the aim of implementing and maintaining effective security policies. Laboratory classes, based on an example of a website, provide the opportunity to gain practical skills in developing secure electronic commerce systems.\n\nOutcome:\nAbility to define, interpret and use professional terminology in e-commerce. - The test, based on theoretical knowledge, shows the ability to constructively analyze the problem to be solved using professional terminology.\r\nAbility to analyze problem situations and independently conclude on the use of secure e-commerce solutions in business. - During the laboratory work, the ability to identify possible solutions, limitations of the given task and to offer alternatives to alternative solutions is shown.\r\nAbility to develop an e-commerce solution project and implement a website prototype. - During the execution of the laboratory work, the ability to perform the assigned tasks following the instructions are shown.\r\nAbility to explain the nature, potential and importance of using security solutions in specific areas of e-commerce. - The examination demonstrates the ability to recognize the essence of formulated thematic issues, as well as to provide a concise and reasoned explanation of the given topics." . . "Presential"@en . "TRUE" . . "Others"@en . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . "Master of Cybersecurity Engineering"@en . . "https://international.rtu.lv/masters-studies/cybersecurity-engineering/" . "120"^^ . "Presential"@en . "The mission of the academic master’s study programme “Cybersecurity Engineering” is to provide a set of theoretical knowledge and practical skills for students to achieve competencies corresponding to a Master’s degree in cybersecurity engineering. In the academic Master’s studies, the student acquires the necessary knowledge, skills and competence for comprehensive and effective action in the field of cybersecurity engineering in the chosen economic sector – design, implementation, improvement and management of IT security systems, understanding of professional ethics and socially responsible management, which forms the basis for further studies for a higher level of knowledge and skills acquisition.\n\nThe aim of the study programme “Cybersecurity Engineering” is to prepare top level specialists in cybersecurity who can (1) understand and develop the cybersecurity policy of companies and various organizations as well as public space; 2) design, implement, monitor and proactively develop cybersecurity measures; (3) conducting international research in cybersecurity; and (4) continue education for professional development or in doctoral studies.\n\nOutcome:\nAs a result of the studies the graduate is able to:\n- identify, justify and formulate information technology security issues;\n- design, implement and operate cybersecurity management systems;\n- analyse, evaluate and develop management systems according to IT security requirements;\n- develop a corporate digital strategy and align it with the information security strategy;\n- critically analyse a system monitoring data, identify and manage cybersecurity risks;\n- apply IT, cybersecurity, data mining and integration tools and techniques, as well as social technologies to protect company information assets;\n- develop organizational measures and technical solutions for cybersecurity threats;\n- integrate information security solutions at the network, hardware, software data and process levels and synthesize unified and systemic security management solutions;\n- ensure safe operation of engineering and socio-technical systems;\n- provide organizational measures and technical solutions for the protection of the company's critical infrastructure;\n- assess and ensure that information security solutions meet industry standards and legal requirements;\n- communicate, advise, collaborate and argue for cybersecurity objectives and outcomes;\n- independently conduct scientific research in information technologies"@en . . . "2"@en . "FALSE" . . "Master"@en . "Thesis" . "Not informative" . "no data"@en . "Not informative" . "None" . "Graduates of the study programme are prepared for work in both the state and local government, as well as in the private sector – in commercial companies, small and medium enterprises. The study programme is suitable for students who want to become a cybersecurity analyst, cybersecurity engineer, cybersecurity architect, cybersecurity consultant. Graduates are also prepared for continuing work in industrial research and development as well as in scientific research and higher education."@en . "no data" . "TRUE" . "Midstream"@en . . . . . . . . . . . . . . . . . . .